Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 317
- Application software 284
- Web site development 198
- Engineering & Applied Sciences 185
- Management 153
- Computer programs 152
- Web sites 137
- Computer Science 134
- Computer networks 134
- Design 125
- Examinations 124
- Data processing 121
- Security measures 115
- Machine learning 114
- Python (Computer program language) 114
- Microsoft .NET Framework 106
- Cloud computing 102
- Computer software 102
- Java (Computer program language) 100
- Computer programming 98
- Software engineering 95
- Artificial intelligence 89
- Database management 89
- JavaScript (Computer program language) 89
- Computer security 82
- Certification 81
- Data mining 75
- Web applications 75
- Internet programming 73
- Electronic data processing personnel 70
-
3121Publicado 2017Tabla de Contenidos: “…7.2.6 Data Postprocessing 219 -- 7.2.7 Postvisit to Site 219 -- 7.3 Types of Measurement Systems 220 -- 7.3.1 Narrowband Measurements 220 -- 7.3.1.1 CW Measurements 221 -- 7.3.1.2 Code Scanning 223 -- 7.3.1.3 Engineering Test Mobiles 224 -- 7.3.1.4 Comparative Analysis 224 -- 7.3.2 Wideband Measurements 226 -- 7.4 Measurement Equipment 228 -- 7.4.1 Transmit Equipment 228 -- 7.4.2 Receive Rquipment 229 -- 7.4.3 Miscellaneous Testing Components 230 -- 7.4.4 Buyer's Guide 232 -- 7.5 Types of Indoor Measurement Surveys 233 -- 7.5.1 Design Survey 233 -- 7.5.2 Existing Coverage 234 -- 7.6 Guidelines for Effective Radio Measurements 235 -- 7.6.1 Planning Your Measurements: The MCP 235 -- 7.6.1.1 Introduction 236 -- 7.6.1.2 Objectives 236 -- 7.6.1.3 Requirements 236 -- 7.6.1.4 Antenna Locations 237 -- 7.6.1.5 Walk Test Routes 238 -- 7.6.1.6 Workplan 238 -- 7.6.1.7 Implications of Not Having an MCP 238 -- 7.6.2 Choose a Suitable Navigation System 238 -- 7.6.3 Signal Sampling and Averaging Considerations 241 -- 7.6.4 Documentation 245 -- 7.6.5 Walk Test Best Practice 246 -- 7.6.6 Equipment Calibration and Validation 247 -- 7.7 Model Tuning and Validation 250 -- 7.7.1 Measurements for Model Tuning 251 -- 7.7.2 Factors Affecting Model Tuning 252 -- 7.7.3 Impact of Having Insufficient Measurements for Tuning 252 -- 7.8 Conclusion 254 -- References 255 -- 8 Capacity Planning and Dimensioning 257 -- 8.1 Introduction 257 -- 8.2 An Overview On Teletraffic 258 -- 8.2.1 Trunking 259 -- 8.2.2 Loss and Queue Networks 260 -- 8.2.3 Busy-Hour 260 -- 8.3 Capacity Parameters / Circuit-Switched 260 -- 8.3.1 Blocking 260 -- 8.3.2 Grade of Service 261 -- 8.3.3 Traffic per User 261 -- 8.3.4 Offered and Carried Traffic 262 -- 8.3.5 Traffic Categories 263 -- 8.4 Data Transmission Parameters 264 -- 8.4.1 Delay 264 -- 8.4.2 Throughput 264 -- 8.4.3 Latency 264 -- 8.5 Capacity Limits 265 -- 8.6 Radio Resource Management 265 -- 8.7 Load Sharing: Base Station Hotels 266 -- 8.8 Traffic Mapping 267 -- 8.9 Capacity Calculations 267.…”
Libro electrónico -
3122
-
3123Publicado 2017“…This course teaches you the techniques required for acquiring, validating, and protecting digital evidence in order to ensure the evidence is accurate and free from tampering. …”
-
3124Publicado 2020Tabla de Contenidos: “…Quality Evaluation of Territorial Structures for Patients with Dementia -- Abstract -- 1 Introduction and Research Purpose -- 1.1 Methodology -- 1.2 Case Study Analysis -- 1.3 Evaluation Tools Analysis -- 2 The Assessment Tool -- 2.1 Tool Definition and Validation -- 2.2 Application and Test on Italian Case Studies -- 2.3 Preliminary Results -- 3 Conclusions and Future Developments -- Acknowledgements -- References -- Transforming the Built Environment Through Healthy-Design Strategies -- Abstract -- 1 Theoretical Scenario -- 1.1 State of the Art -- 1.2 Research Opportunities -- 2 Methodological Framework -- 2.1 Intelligence Phase -- 2.2 Design Phase -- 2.3 Choice Phase -- 3 Evaluating the Built Environment -- 3.1 Sustainability and Hygiene of the Built Environment -- 4 Conclusions -- Acknowledgments -- References…”
Libro electrónico -
3125Publicado 2011Tabla de Contenidos: “…6.5 C4.5 Algorithm: Generating Decision Rules 185 -- 6.6 CART Algorithm & Gini Index 189 -- 6.7 Limitations of Decision Trees and Decision Rules 192 -- 6.8 Review Questions and Problems 194 -- 6.9 References for Further Study 198 -- 7 ARTIFICIAL NEURAL NETWORKS 199 -- 7.1 Model of an Artifi cial Neuron 201 -- 7.2 Architectures of ANNs 205 -- 7.3 Learning Process 207 -- 7.4 Learning Tasks Using ANNs 210 -- 7.5 Multilayer Perceptrons (MLPs) 213 -- 7.6 Competitive Networks and Competitive Learning 221 -- 7.7 SOMs 225 -- 7.8 Review Questions and Problems 231 -- 7.9 References for Further Study 233 -- 8 ENSEMBLE LEARNING 235 -- 8.1 Ensemble-Learning Methodologies 236 -- 8.2 Combination Schemes for Multiple Learners 240 -- 8.3 Bagging and Boosting 241 -- 8.4 AdaBoost 243 -- 8.5 Review Questions and Problems 245 -- 8.6 References for Further Study 247 -- 9 CLUSTER ANALYSIS 249 -- 9.1 Clustering Concepts 250 -- 9.2 Similarity Measures 253 -- 9.3 Agglomerative Hierarchical Clustering 259 -- 9.4 Partitional Clustering 263 -- 9.5 Incremental Clustering 266 -- 9.6 DBSCAN Algorithm 270 -- 9.7 BIRCH Algorithm 272 -- 9.8 Clustering Validation 275 -- 9.9 Review Questions and Problems 275 -- 9.10 References for Further Study 279 -- 10 ASSOCIATION RULES 280 -- 10.1 Market-Basket Analysis 281 -- 10.2 Algorithm Apriori 283 -- 10.3 From Frequent Itemsets to Association Rules 285 -- 10.4 Improving the Effi ciency of the Apriori Algorithm 286 -- 10.5 FP Growth Method 288 -- 10.6 Associative-Classifi cation Method 290 -- 10.7 Multidimensional Association-Rules Mining 293 -- 10.8 Review Questions and Problems 295 -- 10.9 References for Further Study 298 -- 11 WEB MINING AND TEXT MINING 300 -- 11.1 Web Mining 300 -- 11.2 Web Content, Structure, and Usage Mining 302 -- 11.3 HITS and LOGSOM Algorithms 305 -- 11.4 Mining Path-Traversal Patterns 310 -- 11.5 PageRank Algorithm 313 -- 11.6 Text Mining 316 -- 11.7 Latent Semantic Analysis (LSA) 320 -- 11.8 Review Questions and Problems 324 -- 11.9 References for Further Study 326.…”
Libro electrónico -
3126por Mueller, John PaulTabla de Contenidos: “…Intro -- Title Page -- Copyright Page -- Table of Contents -- Introduction -- About This Book -- Foolish Assumptions -- Icons Used in This Book -- Beyond the Book -- Where to Go from Here -- Book 1 Defining Data Science -- Chapter 1 Considering the History and Uses of Data Science -- Considering the Elements of Data Science -- Considering the emergence of data science -- Outlining the core competencies of a data scientist -- Linking data science, big data, and AI -- Understanding the role of programming -- Defining the Role of Data in the World -- Enticing people to buy products -- Keeping people safer -- Creating new technologies -- Performing analysis for research -- Providing art and entertainment -- Making life more interesting in other ways -- Creating the Data Science Pipeline -- Preparing the data -- Performing exploratory data analysis -- Learning from data -- Visualizing -- Obtaining insights and data products -- Comparing Different Languages Used for Data Science -- Obtaining an overview of data science languages -- Defining the pros and cons of using Python -- Defining the pros and cons of using R -- Learning to Perform Data Science Tasks Fast -- Loading data -- Training a model -- Viewing a result -- Chapter 2 Placing Data Science within the Realm of AI -- Seeing the Data to Data Science Relationship -- Considering the data architecture -- Acquiring data from various sources -- Performing data analysis -- Archiving the data -- Defining the Levels of AI -- Beginning with AI -- Advancing to machine learning -- Getting detailed with deep learning -- Creating a Pipeline from Data to AI -- Considering the desired output -- Defining a data architecture -- Combining various data sources -- Checking for errors and fixing them -- Performing the analysis -- Validating the result -- Enhancing application performance…”
Publicado 2020
Libro electrónico -
3127Publicado 2018Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Dedication -- Packt Upsell -- Contributors -- Table of Contents -- Preface -- Chapter 1: Bypassing Network Access Control -- Technical requirements -- Bypassing MAC filtering - considerations for the physical assessor -- Configuring a Kali wireless access point to bypass MAC filtering -- Design weaknesses - exploiting weak authentication mechanisms -- Capturing captive portal authentication conversations in the clear -- Layer-2 attacks against the network -- Bypassing validation checks -- Confirming the Organizationally Unique Identifier -- Passive Operating system Fingerprinter -- Spoofing the HTTP User-Agent -- Breaking out of jail - masquerading the stack -- Following the rules spoils the fun - suppressing normal TCP replies -- Fabricating the handshake with Scapy and Python -- Summary -- Questions -- Further reading -- Chapter 2: Sniffing and Spoofing -- Technical requirements -- Advanced Wireshark - going beyond simple captures -- Passive wireless analysis -- Targeting WLANs with the Aircrack-ng suite -- WLAN analysis with Wireshark -- Active network analysis with Wireshark -- Advanced Ettercap - the man-in-the-middle Swiss Army Knife -- Bridged sniffing and the malicious access point -- Ettercap filters - fine-tuning your analysis -- Killing connections with Ettercap filters -- Getting better - spoofing with BetterCAP -- ICMP redirection with BetterCAP -- Summary -- Questions -- Further reading -- Chapter 3: Windows Passwords on the Network -- Technical requirements -- Understanding Windows passwords -- A crash course on hash algorithms -- Password hashing methods in Windows -- If it ends with 1404EE, then it's easy for me - understanding LM hash flaws -- Authenticating over the network-a different game altogether -- Capturing Windows passwords on the network…”
Libro electrónico -
3128Publicado 2018Tabla de Contenidos: “…Inspection and adaption -- The importance of User Experience (UX) -- Shifting left -- Shifting right -- Introducing some Lean thinking to improve flow -- The coin game results -- Systems thinking - Optimizing the whole -- Changing our workflow -- Kaizen and developing a small, continuous improvement mindset -- Fail Cake -- Root cause analysis with the Five Whys method -- Adopting Lean Startup methods to validate ideas -- Build, Measure, Learn -- An example of Lean Startup MVP -- Background -- Hypothesis -- Approach -- Learning rapidly by doing and failing fast -- Summary -- Chapter 9: Seeking Value - How to Deliver Better Software Sooner -- Moving from project to product thinking -- Cynefin - A sense-making framework -- The advantages of a product team -- Moving from project to product -- Setting objectives to create alignment of purpose -- Using Objectives and Key Results (OKRs) -- Hypothesis-Driven Development (HDD) -- Data, Insights, Beliefs, Bets (DIBBs) -- Seeking value -- How to seek value -- Telling our team "the why" not "the what -- Summary -- Chapter 10: Using Product Roadmaps to Guide Software Delivery -- The importance of Product Roadmaps -- Product Discovery to create roadmaps -- User Story Mapping -- Activity - creating a User Story Map -- Step 1 - User roles -- Step 2 - The first User Journey -- Step 3 - Alternative paths, sub-tasks, details, and business rules -- Step 4 - Naming the activities -- Leveraging the User Story Map -- Impact Mapping -- Activity - Creating an Impact Map -- Question 1 - Why are we doing this? …”
Libro electrónico -
3129Publicado 2018Tabla de Contenidos: “…-- Popular alternatives to TensorFlow -- GPU requirements for TensorFlow and Keras -- Installing Nvidia CUDA Toolkit and cuDNN -- Installing Python -- Installing TensorFlow and Keras -- Building datasets for deep learning -- Bias and variance errors in deep learning -- The train, val, and test datasets -- Managing bias and variance in deep neural networks -- K-Fold cross-validation -- Summary -- Chapter 2: Using Deep Learning to Solve Regression Problems -- Regression analysis and deep neural networks -- Benefits of using a neural network for regression -- Drawbacks to consider when using a neural network for regression -- Using deep neural networks for regression -- How to plan a machine learning problem -- Defining our example problem -- Loading the dataset -- Defining our cost function -- Building an MLP in Keras -- Input layer shape -- Hidden layer shape -- Output layer shape -- Neural network architecture -- Training the Keras model -- Measuring the performance of our model -- Building a deep neural network in Keras -- Measuring the deep neural network performance -- Tuning the model hyperparameters -- Saving and loading a trained Keras model -- Summary…”
Libro electrónico -
3130Publicado 2018Tabla de Contenidos: “…Answering a DELETE request -- Answering an UPDATE request -- Empty responses -- Working with JSON -- Understanding serialization -- Using simple objects -- Working with complex objects -- Adding telephones to our customers -- Handling null values -- Understanding deserialization -- From a request into an object -- Deserializing complex objects -- Validating objects -- Handling errors -- Using controller advice -- Creating business exceptions -- Avoiding the controller advice -- Summary -- Chapter 4: Creating Reactive Microservices -- Understanding Spring WebFlux -- Creating a Spring WebFlux application -- Using Netty -- Serving static context -- Adding a RestController -- Creating a customer service -- Blocking is not reactive -- Creating reactive services -- Understanding subscribers and publishers -- Publishing a single object -- Using Mono in a service -- Publishing multiple objects -- Using Flux in a service -- Receiving objects reactively -- Using functional web programming -- Using RouterFunction -- Creating handlers -- Using reactive services -- Handling multiple routes -- Using query parameters -- Processing a JSON body -- Handling reactive errors -- Capturing errors on Handlers -- Publishing errors -- Summary -- Chapter 5: Reactive Spring Data -- NoSQL databases -- What is a SQL database? …”
Libro electrónico -
3131Publicado 2018Tabla de Contenidos: “…. -- Adding constraint validations to a Model -- Getting ready -- How to do it... -- How it works... -- Adding computed fields to a Model -- Getting ready -- How to do it... -- How it works... -- Exposing related fields stored in other Models -- Getting ready -- How to do it... -- How it works... -- There's more... -- Adding dynamic relations using Reference fields -- Getting ready -- How to do it... -- How it works... -- Adding features to a Model using inheritance -- Getting ready -- How to do it... -- How it works... -- There's more... -- Using abstract Models for reusable Model features -- Getting ready -- How to do it... -- How it works... -- There's more... -- Using delegation inheritance to copy features to another Model -- Getting ready -- How to do it... -- How it works... -- There's more... -- Chapter 6: Basic Server-Side Development -- Introduction -- Defining model methods and using the API decorators -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Reporting errors to the user -- Getting ready -- How to do it... -- How it works... -- There's more... -- Obtaining an empty recordset for a different model -- Getting ready -- How to do it... -- How it works... -- See also -- Creating new records -- Getting ready…”
Libro electrónico -
3132por Vanderburg, Eric A.Tabla de Contenidos: “…Snapshots -- Storage Migration -- Host Clustering and HA/DR -- Cloud Provider Migrations -- Exercise 6-1: Creating a Cloud Firewall on Azure -- Migration Considerations -- Requirements Gathering -- Migration Scheduling -- Upgrading -- Testing -- Databases -- Software Defined -- Software Defined Network -- Software Defined Storage -- Software Defined Data Center -- Chapter Review -- Questions -- Answers -- Chapter 7 Cloud Adoption -- Planning -- Requirement Analysis -- Designing a Solution -- Selection -- Deployment Plan -- Approval -- Implementation -- Service Model Solutions -- Solutions -- Deploying Virtual Systems -- Networking -- Exercise 7-1: Creating a Virtual Network in Azure -- Exercise 7-2: Creating a Default Route on Azure -- Containers -- Post-Deployment Validation -- Remote Access Tools -- Remote Hypervisor Access -- RDP -- Console Port -- SSH -- HTTP…”
Publicado 2021
Libro electrónico -
3133Publicado 2021Tabla de Contenidos: “…-- When Should All of This Data Be Uploaded to the Deal Room? -- Validating Your Claims -- The Dos and Don'ts During Meetings -- Managing the Flow of Information -- What to Look for in the Potential Buyer -- What Information Is The Buyer Asking For? …”
Libro electrónico -
3134Publicado 2018Tabla de Contenidos: “…Going live -- Exporting orders to CSV files -- Adding custom actions to the administration site -- Extending the admin site with custom views -- Generating PDF invoices dynamically -- Installing WeasyPrint -- Creating a PDF template -- Rendering PDF files -- Sending PDF files by email -- Summary -- Chapter 9: Extending Your Shop -- Creating a coupon system -- Building the coupon models -- Applying a coupon to the shopping cart -- Applying coupons to orders -- Adding internationalization and localization -- Internationalization with Django -- Internationalization and localization settings -- Internationalization management commands -- How to add translations to a Django project -- How Django determines the current language -- Preparing our project for internationalization -- Translating Python code -- Standard translations -- Lazy translations -- Translations including variables -- Plural forms in translations -- Translating your own code -- Translating templates -- The {% trans %} template tag -- The {% blocktrans %} template tag -- Translating the shop templates -- Using the Rosetta translation interface -- Fuzzy translations -- URL patterns for internationalization -- Adding a language prefix to URL patterns -- Translating URL patterns -- Allowing users to switch language -- Translating models with django-parler -- Installing django-parler -- Translating model fields -- Integrating translations in the administration site -- Creating migrations for model translations -- Adapting views for translations -- Format localization -- Using django-localflavor to validate form fields -- Building a recommendation engine -- Recommending products based on previous purchases -- Summary -- Chapter 10: Building an E-Learning Platform -- Setting up the e-learning project -- Building the course models -- Registering the models in the administration site…”
Libro electrónico -
3135Publicado 2022Tabla de Contenidos: “…-- Computing the Hash Code of an Object -- Comparing Objects for Equality -- String Representation of an Object -- Cloning Objects -- Finalizing an Object -- Immutable Objects -- The Objects Class -- Bounds Checks -- Comparing Objects -- Computing Hash Code -- Checking for Null -- Validating Arguments -- Obtaining String Representation of Objects -- Using the Objects Class -- Summary -- Chapter 12: Wrapper Classes -- Wrapper Classes -- Numeric Wrapper Classes -- The Character Wrapper Class -- The Boolean Wrapper Class -- Unsigned Numeric Operations -- Autoboxing and Unboxing -- Beware of Null Values -- Overloaded Methods and Autoboxing/Unboxing -- Comparison Operators and Autoboxing/Unboxing -- Collections and Autoboxing/Unboxing -- Summary -- Chapter 13: Exception Handling -- What Is an Exception? …”
Libro electrónico -
3136Publicado 2021Tabla de Contenidos: “…-- How Do You Detect the Abuse of Valid Account to Obtain High-Level Permissions? -- Prerequisites -- Configure GuardDuty to Detect Privilege Escalation -- Reviewing the Findings -- How Do You Detect Credential Access? …”
Libro electrónico -
3137Publicado 2022Tabla de Contenidos: “…Rearranging document sections in Outline view -- Collapsing and Expanding Parts of a Document -- Generating a Table of Contents -- Creating a TOC -- Updating and removing a TOC -- Customizing a TOC -- Changing the structure of a TOC -- Indexing a Document -- Marking index items in the document -- Generating the index -- Editing an index -- Putting Cross-References in a Document -- Putting Footnotes and Endnotes in Documents -- Entering a footnote or endnote -- Choosing the numbering scheme and position of notes -- Deleting, moving, and editing notes -- Compiling a Bibliography -- Inserting a citation for your bibliography -- Editing a citation -- Changing how citations appear in text -- Generating the bibliography -- Book 3 Excel 365 -- Chapter 1 Up and Running with Excel -- Creating a New Excel Workbook -- Getting Acquainted with Excel -- Rows, columns, and cell addresses -- Workbooks and worksheets -- Entering Data in a Worksheet -- The basics of entering data -- Entering text labels -- Entering numeric values -- Entering date and time values -- Quickly Entering Lists and Serial Data with the AutoFill Command -- Formatting Numbers, Dates, and Time Values -- Establishing Data-Validation Rules -- Chapter 2 Refining Your Worksheet -- Editing Worksheet Data -- Moving Around in a Worksheet -- Getting a Better Look at the Worksheet -- Freezing and splitting columns and rows -- Hiding columns and rows -- Notes for Documenting Your Worksheet -- Comments for Collaborating with Others on a Workbooks -- Selecting Cells in a Worksheet -- Deleting, Copying, and Moving Data -- Handling the Worksheets in a Workbook -- Keeping Others from Tampering with Worksheets -- Hiding a worksheet -- Protecting a worksheet -- Chapter 3 Formulas and Functions for Crunching Numbers -- How Formulas Work -- Referring to cells in formulas -- Referring to formula results in formulas…”
Libro electrónico -
3138por Du, XiangyunTabla de Contenidos: “…-- 6.10.2 Caren Andrews: Mapping Terrains, Getting Out of My Own Way, Exchange -- 6.10.3 Devika G: Things Talk to Me, Mapping Terrains, Getting Out of My Own Way -- 6.11 Some Challenges to Accordion Book Methodologies -- 6.12 Conclusion -- Acknowledgements -- References -- Chapter 7 - Practice-Based Reflections of Enabling Agency through Arts-Based Methodological Ir/Responsibility -- 7.1 Disrupting Positionality in Educational Research -- 7.1.1 The Possibilities for Methodological Ir/Responsibility -- 7.2 Methodology -- 7.3 Practice-Based Reflections on the Purposive Validity of Arts-Based Methods -- 7.3.1 Creating the Conditions to 'Listen' to Participants' Experiences in and of HE for Evaluation Purposes -- 7.3.2 Creating the Conditions for Participants to Author their Stories of HE -- 7.3.3 Concerns, Limitations and Improvement -- 7.4 Conclusion -- References -- Chapter 8 - Blind Running: 25 Pictures Per Page -- Acknowledgements -- References -- Chapter 9 - How Can Inspiration Be Encouraged in Art Learning? …”
Publicado 2022
Libro electrónico -
3139por Ratnayake, Rakhitha NimeshTabla de Contenidos: “…-- Understanding the importance of code structuring -- Integrating Backbone.js and Underscore.js -- Creating a developer profile page with Backbone.js -- Structuring with Backbone.js and Underscore.js -- Displaying the projects list on page load -- Creating new projects from the frontend -- Integrating events to the Backbone.js views -- Validating and creating new models on the server -- Creating new models on the server -- Using PHPMailer for custom e-mail sending -- Usage of PHPMailer within the WordPress core -- Creating a custom version of the pluggable wp_mail function -- Loading PHPMailer inside plugins and creating custom functions -- Implementing user authentication with Opauth -- Configuring login strategies -- Building a LinkedIn app -- Process of requesting the strategies -- Initializing the Opauth library -- Authenticating users in our application -- Using third-party libraries and plugins -- Time for action -- Summary -- 9. …”
Publicado 2013
Libro electrónico -
3140por Russinovich, Mark E.Tabla de Contenidos: “…Child Partitions -- Hardware Emulation and Support -- Kernel Transaction Manager -- Hotpatch Support -- Kernel Patch Protection -- Code Integrity -- Conclusion -- Management Mechanisms -- The Registry -- Viewing and Changing the Registry -- Registry Usage -- Registry Data Types -- Registry Logical Structure -- Transactional Registry (TxR) -- Monitoring Registry Activity -- Registry Internals -- Services -- Service Applications -- The Service Control Manager -- Service Startup -- Startup Errors -- Accepting the Boot and Last Known Good -- Service Failures -- Service Shutdown -- Shared Service Processes -- Service Tags -- Service Control Programs -- Windows Management Instrumentation -- Providers -- The Common Information Model and the Managed Object Format Language -- Class Association -- WMI Implementation -- WMI Security -- Windows Diagnostic Infrastructure -- WDI Instrumentation -- Diagnostic Policy Service -- Diagnostic Functionality -- Conclusion -- Processes, Threads, and Jobs -- Process Internals -- Data Structures -- Kernel Variables -- Performance Counters -- Relevant Functions -- Protected Processes -- Flow of CreateProcess -- Stage 1: Converting and Validating Parameters and Flags -- Stage 2: Opening the Image to Be Executed -- Stage 3: Creating the Windows Executive Process Object (PspAllocateProcess) -- Stage 4: Creating the Initial Thread and Its Stack and Context -- Stage 5: Performing Windows Subsystem-Specific Post-Initialization -- Stage 6: Starting Execution of the Initial Thread -- Stage 7: Performing Process Initialization in the Context of the New Process -- Thread Internals -- Data Structures -- Kernel Variables -- Performance Counters -- Relevant Functions -- Birth of a Thread -- Examining Thread Activity -- Limitations on Protected Process Threads -- Worker Factories (Thread Pools) -- Thread Scheduling…”
Publicado 2009
Libro electrónico