Mostrando 3,121 - 3,140 Resultados de 4,995 Para Buscar 'Övralid~', tiempo de consulta: 1.61s Limitar resultados
  1. 3121
    Publicado 2017
    Tabla de Contenidos: “…7.2.6 Data Postprocessing 219 -- 7.2.7 Postvisit to Site 219 -- 7.3 Types of Measurement Systems 220 -- 7.3.1 Narrowband Measurements 220 -- 7.3.1.1 CW Measurements 221 -- 7.3.1.2 Code Scanning 223 -- 7.3.1.3 Engineering Test Mobiles 224 -- 7.3.1.4 Comparative Analysis 224 -- 7.3.2 Wideband Measurements 226 -- 7.4 Measurement Equipment 228 -- 7.4.1 Transmit Equipment 228 -- 7.4.2 Receive Rquipment 229 -- 7.4.3 Miscellaneous Testing Components 230 -- 7.4.4 Buyer's Guide 232 -- 7.5 Types of Indoor Measurement Surveys 233 -- 7.5.1 Design Survey 233 -- 7.5.2 Existing Coverage 234 -- 7.6 Guidelines for Effective Radio Measurements 235 -- 7.6.1 Planning Your Measurements: The MCP 235 -- 7.6.1.1 Introduction 236 -- 7.6.1.2 Objectives 236 -- 7.6.1.3 Requirements 236 -- 7.6.1.4 Antenna Locations 237 -- 7.6.1.5 Walk Test Routes 238 -- 7.6.1.6 Workplan 238 -- 7.6.1.7 Implications of Not Having an MCP 238 -- 7.6.2 Choose a Suitable Navigation System 238 -- 7.6.3 Signal Sampling and Averaging Considerations 241 -- 7.6.4 Documentation 245 -- 7.6.5 Walk Test Best Practice 246 -- 7.6.6 Equipment Calibration and Validation 247 -- 7.7 Model Tuning and Validation 250 -- 7.7.1 Measurements for Model Tuning 251 -- 7.7.2 Factors Affecting Model Tuning 252 -- 7.7.3 Impact of Having Insufficient Measurements for Tuning 252 -- 7.8 Conclusion 254 -- References 255 -- 8 Capacity Planning and Dimensioning 257 -- 8.1 Introduction 257 -- 8.2 An Overview On Teletraffic 258 -- 8.2.1 Trunking 259 -- 8.2.2 Loss and Queue Networks 260 -- 8.2.3 Busy-Hour 260 -- 8.3 Capacity Parameters / Circuit-Switched 260 -- 8.3.1 Blocking 260 -- 8.3.2 Grade of Service 261 -- 8.3.3 Traffic per User 261 -- 8.3.4 Offered and Carried Traffic 262 -- 8.3.5 Traffic Categories 263 -- 8.4 Data Transmission Parameters 264 -- 8.4.1 Delay 264 -- 8.4.2 Throughput 264 -- 8.4.3 Latency 264 -- 8.5 Capacity Limits 265 -- 8.6 Radio Resource Management 265 -- 8.7 Load Sharing: Base Station Hotels 266 -- 8.8 Traffic Mapping 267 -- 8.9 Capacity Calculations 267.…”
    Libro electrónico
  2. 3122
    por Steingruber, Andrea M.
    Publicado 2012
    Libro
  3. 3123
    Publicado 2017
    “…This course teaches you the techniques required for acquiring, validating, and protecting digital evidence in order to ensure the evidence is accurate and free from tampering. …”
    Video
  4. 3124
    Publicado 2020
    Tabla de Contenidos: “…Quality Evaluation of Territorial Structures for Patients with Dementia -- Abstract -- 1 Introduction and Research Purpose -- 1.1 Methodology -- 1.2 Case Study Analysis -- 1.3 Evaluation Tools Analysis -- 2 The Assessment Tool -- 2.1 Tool Definition and Validation -- 2.2 Application and Test on Italian Case Studies -- 2.3 Preliminary Results -- 3 Conclusions and Future Developments -- Acknowledgements -- References -- Transforming the Built Environment Through Healthy-Design Strategies -- Abstract -- 1 Theoretical Scenario -- 1.1 State of the Art -- 1.2 Research Opportunities -- 2 Methodological Framework -- 2.1 Intelligence Phase -- 2.2 Design Phase -- 2.3 Choice Phase -- 3 Evaluating the Built Environment -- 3.1 Sustainability and Hygiene of the Built Environment -- 4 Conclusions -- Acknowledgments -- References…”
    Libro electrónico
  5. 3125
    Publicado 2011
    Tabla de Contenidos: “…6.5 C4.5 Algorithm: Generating Decision Rules 185 -- 6.6 CART Algorithm & Gini Index 189 -- 6.7 Limitations of Decision Trees and Decision Rules 192 -- 6.8 Review Questions and Problems 194 -- 6.9 References for Further Study 198 -- 7 ARTIFICIAL NEURAL NETWORKS 199 -- 7.1 Model of an Artifi cial Neuron 201 -- 7.2 Architectures of ANNs 205 -- 7.3 Learning Process 207 -- 7.4 Learning Tasks Using ANNs 210 -- 7.5 Multilayer Perceptrons (MLPs) 213 -- 7.6 Competitive Networks and Competitive Learning 221 -- 7.7 SOMs 225 -- 7.8 Review Questions and Problems 231 -- 7.9 References for Further Study 233 -- 8 ENSEMBLE LEARNING 235 -- 8.1 Ensemble-Learning Methodologies 236 -- 8.2 Combination Schemes for Multiple Learners 240 -- 8.3 Bagging and Boosting 241 -- 8.4 AdaBoost 243 -- 8.5 Review Questions and Problems 245 -- 8.6 References for Further Study 247 -- 9 CLUSTER ANALYSIS 249 -- 9.1 Clustering Concepts 250 -- 9.2 Similarity Measures 253 -- 9.3 Agglomerative Hierarchical Clustering 259 -- 9.4 Partitional Clustering 263 -- 9.5 Incremental Clustering 266 -- 9.6 DBSCAN Algorithm 270 -- 9.7 BIRCH Algorithm 272 -- 9.8 Clustering Validation 275 -- 9.9 Review Questions and Problems 275 -- 9.10 References for Further Study 279 -- 10 ASSOCIATION RULES 280 -- 10.1 Market-Basket Analysis 281 -- 10.2 Algorithm Apriori 283 -- 10.3 From Frequent Itemsets to Association Rules 285 -- 10.4 Improving the Effi ciency of the Apriori Algorithm 286 -- 10.5 FP Growth Method 288 -- 10.6 Associative-Classifi cation Method 290 -- 10.7 Multidimensional Association-Rules Mining 293 -- 10.8 Review Questions and Problems 295 -- 10.9 References for Further Study 298 -- 11 WEB MINING AND TEXT MINING 300 -- 11.1 Web Mining 300 -- 11.2 Web Content, Structure, and Usage Mining 302 -- 11.3 HITS and LOGSOM Algorithms 305 -- 11.4 Mining Path-Traversal Patterns 310 -- 11.5 PageRank Algorithm 313 -- 11.6 Text Mining 316 -- 11.7 Latent Semantic Analysis (LSA) 320 -- 11.8 Review Questions and Problems 324 -- 11.9 References for Further Study 326.…”
    Libro electrónico
  6. 3126
    por Mueller, John Paul
    Publicado 2020
    Tabla de Contenidos: “…Intro -- Title Page -- Copyright Page -- Table of Contents -- Introduction -- About This Book -- Foolish Assumptions -- Icons Used in This Book -- Beyond the Book -- Where to Go from Here -- Book 1 Defining Data Science -- Chapter 1 Considering the History and Uses of Data Science -- Considering the Elements of Data Science -- Considering the emergence of data science -- Outlining the core competencies of a data scientist -- Linking data science, big data, and AI -- Understanding the role of programming -- Defining the Role of Data in the World -- Enticing people to buy products -- Keeping people safer -- Creating new technologies -- Performing analysis for research -- Providing art and entertainment -- Making life more interesting in other ways -- Creating the Data Science Pipeline -- Preparing the data -- Performing exploratory data analysis -- Learning from data -- Visualizing -- Obtaining insights and data products -- Comparing Different Languages Used for Data Science -- Obtaining an overview of data science languages -- Defining the pros and cons of using Python -- Defining the pros and cons of using R -- Learning to Perform Data Science Tasks Fast -- Loading data -- Training a model -- Viewing a result -- Chapter 2 Placing Data Science within the Realm of AI -- Seeing the Data to Data Science Relationship -- Considering the data architecture -- Acquiring data from various sources -- Performing data analysis -- Archiving the data -- Defining the Levels of AI -- Beginning with AI -- Advancing to machine learning -- Getting detailed with deep learning -- Creating a Pipeline from Data to AI -- Considering the desired output -- Defining a data architecture -- Combining various data sources -- Checking for errors and fixing them -- Performing the analysis -- Validating the result -- Enhancing application performance…”
    Libro electrónico
  7. 3127
    Publicado 2018
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Dedication -- Packt Upsell -- Contributors -- Table of Contents -- Preface -- Chapter 1: Bypassing Network Access Control -- Technical requirements -- Bypassing MAC filtering - considerations for the physical assessor -- Configuring a Kali wireless access point to bypass MAC filtering -- Design weaknesses - exploiting weak authentication mechanisms -- Capturing captive portal authentication conversations in the clear -- Layer-2 attacks against the network -- Bypassing validation checks -- Confirming the Organizationally Unique Identifier -- Passive Operating system Fingerprinter -- Spoofing the HTTP User-Agent -- Breaking out of jail - masquerading the stack -- Following the rules spoils the fun - suppressing normal TCP replies -- Fabricating the handshake with Scapy and Python -- Summary -- Questions -- Further reading -- Chapter 2: Sniffing and Spoofing -- Technical requirements -- Advanced Wireshark - going beyond simple captures -- Passive wireless analysis -- Targeting WLANs with the Aircrack-ng suite -- WLAN analysis with Wireshark -- Active network analysis with Wireshark -- Advanced Ettercap - the man-in-the-middle Swiss Army Knife -- Bridged sniffing and the malicious access point -- Ettercap filters - fine-tuning your analysis -- Killing connections with Ettercap filters -- Getting better - spoofing with BetterCAP -- ICMP redirection with BetterCAP -- Summary -- Questions -- Further reading -- Chapter 3: Windows Passwords on the Network -- Technical requirements -- Understanding Windows passwords -- A crash course on hash algorithms -- Password hashing methods in Windows -- If it ends with 1404EE, then it's easy for me - understanding LM hash flaws -- Authenticating over the network-a different game altogether -- Capturing Windows passwords on the network…”
    Libro electrónico
  8. 3128
    Publicado 2018
    Tabla de Contenidos: “…Inspection and adaption -- The importance of User Experience (UX) -- Shifting left -- Shifting right -- Introducing some Lean thinking to improve flow -- The coin game results -- Systems thinking - Optimizing the whole -- Changing our workflow -- Kaizen and developing a small, continuous improvement mindset -- Fail Cake -- Root cause analysis with the Five Whys method -- Adopting Lean Startup methods to validate ideas -- Build, Measure, Learn -- An example of Lean Startup MVP -- Background -- Hypothesis -- Approach -- Learning rapidly by doing and failing fast -- Summary -- Chapter 9: Seeking Value - How to Deliver Better Software Sooner -- Moving from project to product thinking -- Cynefin - A sense-making framework -- The advantages of a product team -- Moving from project to product -- Setting objectives to create alignment of purpose -- Using Objectives and Key Results (OKRs) -- Hypothesis-Driven Development (HDD) -- Data, Insights, Beliefs, Bets (DIBBs) -- Seeking value -- How to seek value -- Telling our team "the why" not "the what -- Summary -- Chapter 10: Using Product Roadmaps to Guide Software Delivery -- The importance of Product Roadmaps -- Product Discovery to create roadmaps -- User Story Mapping -- Activity - creating a User Story Map -- Step 1 - User roles -- Step 2 - The first User Journey -- Step 3 - Alternative paths, sub-tasks, details, and business rules -- Step 4 - Naming the activities -- Leveraging the User Story Map -- Impact Mapping -- Activity - Creating an Impact Map -- Question 1 - Why are we doing this? …”
    Libro electrónico
  9. 3129
    Publicado 2018
    Tabla de Contenidos: “…-- Popular alternatives to TensorFlow -- GPU requirements for TensorFlow and Keras -- Installing Nvidia CUDA Toolkit and cuDNN -- Installing Python -- Installing TensorFlow and Keras -- Building datasets for deep learning -- Bias and variance errors in deep learning -- The train, val, and test datasets -- Managing bias and variance in deep neural networks -- K-Fold cross-validation -- Summary -- Chapter 2: Using Deep Learning to Solve Regression Problems -- Regression analysis and deep neural networks -- Benefits of using a neural network for regression -- Drawbacks to consider when using a neural network for regression -- Using deep neural networks for regression -- How to plan a machine learning problem -- Defining our example problem -- Loading the dataset -- Defining our cost function -- Building an MLP in Keras -- Input layer shape -- Hidden layer shape -- Output layer shape -- Neural network architecture -- Training the Keras model -- Measuring the performance of our model -- Building a deep neural network in Keras -- Measuring the deep neural network performance -- Tuning the model hyperparameters -- Saving and loading a trained Keras model -- Summary…”
    Libro electrónico
  10. 3130
    Publicado 2018
    Tabla de Contenidos: “…Answering a DELETE request -- Answering an UPDATE request -- Empty responses -- Working with JSON -- Understanding serialization -- Using simple objects -- Working with complex objects -- Adding telephones to our customers -- Handling null values -- Understanding deserialization -- From a request into an object -- Deserializing complex objects -- Validating objects -- Handling errors -- Using controller advice -- Creating business exceptions -- Avoiding the controller advice -- Summary -- Chapter 4: Creating Reactive Microservices -- Understanding Spring WebFlux -- Creating a Spring WebFlux application -- Using Netty -- Serving static context -- Adding a RestController -- Creating a customer service -- Blocking is not reactive -- Creating reactive services -- Understanding subscribers and publishers -- Publishing a single object -- Using Mono in a service -- Publishing multiple objects -- Using Flux in a service -- Receiving objects reactively -- Using functional web programming -- Using RouterFunction -- Creating handlers -- Using reactive services -- Handling multiple routes -- Using query parameters -- Processing a JSON body -- Handling reactive errors -- Capturing errors on Handlers -- Publishing errors -- Summary -- Chapter 5: Reactive Spring Data -- NoSQL databases -- What is a SQL database? …”
    Libro electrónico
  11. 3131
    Publicado 2018
    Tabla de Contenidos: “…. -- Adding constraint validations to a Model -- Getting ready -- How to do it... -- How it works... -- Adding computed fields to a Model -- Getting ready -- How to do it... -- How it works... -- Exposing related fields stored in other Models -- Getting ready -- How to do it... -- How it works... -- There's more... -- Adding dynamic relations using Reference fields -- Getting ready -- How to do it... -- How it works... -- Adding features to a Model using inheritance -- Getting ready -- How to do it... -- How it works... -- There's more... -- Using abstract Models for reusable Model features -- Getting ready -- How to do it... -- How it works... -- There's more... -- Using delegation inheritance to copy features to another Model -- Getting ready -- How to do it... -- How it works... -- There's more... -- Chapter 6: Basic Server-Side Development -- Introduction -- Defining model methods and using the API decorators -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Reporting errors to the user -- Getting ready -- How to do it... -- How it works... -- There's more... -- Obtaining an empty recordset for a different model -- Getting ready -- How to do it... -- How it works... -- See also -- Creating new records -- Getting ready…”
    Libro electrónico
  12. 3132
    por Vanderburg, Eric A.
    Publicado 2021
    Tabla de Contenidos: “…Snapshots -- Storage Migration -- Host Clustering and HA/DR -- Cloud Provider Migrations -- Exercise 6-1: Creating a Cloud Firewall on Azure -- Migration Considerations -- Requirements Gathering -- Migration Scheduling -- Upgrading -- Testing -- Databases -- Software Defined -- Software Defined Network -- Software Defined Storage -- Software Defined Data Center -- Chapter Review -- Questions -- Answers -- Chapter 7 Cloud Adoption -- Planning -- Requirement Analysis -- Designing a Solution -- Selection -- Deployment Plan -- Approval -- Implementation -- Service Model Solutions -- Solutions -- Deploying Virtual Systems -- Networking -- Exercise 7-1: Creating a Virtual Network in Azure -- Exercise 7-2: Creating a Default Route on Azure -- Containers -- Post-Deployment Validation -- Remote Access Tools -- Remote Hypervisor Access -- RDP -- Console Port -- SSH -- HTTP…”
    Libro electrónico
  13. 3133
    Publicado 2021
    Tabla de Contenidos: “…-- When Should All of This Data Be Uploaded to the Deal Room? -- Validating Your Claims -- The Dos and Don'ts During Meetings -- Managing the Flow of Information -- What to Look for in the Potential Buyer -- What Information Is The Buyer Asking For? …”
    Libro electrónico
  14. 3134
    Publicado 2018
    Tabla de Contenidos: “…Going live -- Exporting orders to CSV files -- Adding custom actions to the administration site -- Extending the admin site with custom views -- Generating PDF invoices dynamically -- Installing WeasyPrint -- Creating a PDF template -- Rendering PDF files -- Sending PDF files by email -- Summary -- Chapter 9: Extending Your Shop -- Creating a coupon system -- Building the coupon models -- Applying a coupon to the shopping cart -- Applying coupons to orders -- Adding internationalization and localization -- Internationalization with Django -- Internationalization and localization settings -- Internationalization management commands -- How to add translations to a Django project -- How Django determines the current language -- Preparing our project for internationalization -- Translating Python code -- Standard translations -- Lazy translations -- Translations including variables -- Plural forms in translations -- Translating your own code -- Translating templates -- The {% trans %} template tag -- The {% blocktrans %} template tag -- Translating the shop templates -- Using the Rosetta translation interface -- Fuzzy translations -- URL patterns for internationalization -- Adding a language prefix to URL patterns -- Translating URL patterns -- Allowing users to switch language -- Translating models with django-parler -- Installing django-parler -- Translating model fields -- Integrating translations in the administration site -- Creating migrations for model translations -- Adapting views for translations -- Format localization -- Using django-localflavor to validate form fields -- Building a recommendation engine -- Recommending products based on previous purchases -- Summary -- Chapter 10: Building an E-Learning Platform -- Setting up the e-learning project -- Building the course models -- Registering the models in the administration site…”
    Libro electrónico
  15. 3135
    Publicado 2022
    Tabla de Contenidos: “…-- Computing the Hash Code of an Object -- Comparing Objects for Equality -- String Representation of an Object -- Cloning Objects -- Finalizing an Object -- Immutable Objects -- The Objects Class -- Bounds Checks -- Comparing Objects -- Computing Hash Code -- Checking for Null -- Validating Arguments -- Obtaining String Representation of Objects -- Using the Objects Class -- Summary -- Chapter 12: Wrapper Classes -- Wrapper Classes -- Numeric Wrapper Classes -- The Character Wrapper Class -- The Boolean Wrapper Class -- Unsigned Numeric Operations -- Autoboxing and Unboxing -- Beware of Null Values -- Overloaded Methods and Autoboxing/Unboxing -- Comparison Operators and Autoboxing/Unboxing -- Collections and Autoboxing/Unboxing -- Summary -- Chapter 13: Exception Handling -- What Is an Exception? …”
    Libro electrónico
  16. 3136
    Publicado 2021
    Tabla de Contenidos: “…-- How Do You Detect the Abuse of Valid Account to Obtain High-Level Permissions? -- Prerequisites -- Configure GuardDuty to Detect Privilege Escalation -- Reviewing the Findings -- How Do You Detect Credential Access? …”
    Libro electrónico
  17. 3137
    Publicado 2022
    Tabla de Contenidos: “…Rearranging document sections in Outline view -- Collapsing and Expanding Parts of a Document -- Generating a Table of Contents -- Creating a TOC -- Updating and removing a TOC -- Customizing a TOC -- Changing the structure of a TOC -- Indexing a Document -- Marking index items in the document -- Generating the index -- Editing an index -- Putting Cross-References in a Document -- Putting Footnotes and Endnotes in Documents -- Entering a footnote or endnote -- Choosing the numbering scheme and position of notes -- Deleting, moving, and editing notes -- Compiling a Bibliography -- Inserting a citation for your bibliography -- Editing a citation -- Changing how citations appear in text -- Generating the bibliography -- Book 3 Excel 365 -- Chapter 1 Up and Running with Excel -- Creating a New Excel Workbook -- Getting Acquainted with Excel -- Rows, columns, and cell addresses -- Workbooks and worksheets -- Entering Data in a Worksheet -- The basics of entering data -- Entering text labels -- Entering numeric values -- Entering date and time values -- Quickly Entering Lists and Serial Data with the AutoFill Command -- Formatting Numbers, Dates, and Time Values -- Establishing Data-Validation Rules -- Chapter 2 Refining Your Worksheet -- Editing Worksheet Data -- Moving Around in a Worksheet -- Getting a Better Look at the Worksheet -- Freezing and splitting columns and rows -- Hiding columns and rows -- Notes for Documenting Your Worksheet -- Comments for Collaborating with Others on a Workbooks -- Selecting Cells in a Worksheet -- Deleting, Copying, and Moving Data -- Handling the Worksheets in a Workbook -- Keeping Others from Tampering with Worksheets -- Hiding a worksheet -- Protecting a worksheet -- Chapter 3 Formulas and Functions for Crunching Numbers -- How Formulas Work -- Referring to cells in formulas -- Referring to formula results in formulas…”
    Libro electrónico
  18. 3138
    por Du, Xiangyun
    Publicado 2022
    Tabla de Contenidos: “…-- 6.10.2 Caren Andrews: Mapping Terrains, Getting Out of My Own Way, Exchange -- 6.10.3 Devika G: Things Talk to Me, Mapping Terrains, Getting Out of My Own Way -- 6.11 Some Challenges to Accordion Book Methodologies -- 6.12 Conclusion -- Acknowledgements -- References -- Chapter 7 - Practice-Based Reflections of Enabling Agency through Arts-Based Methodological Ir/Responsibility -- 7.1 Disrupting Positionality in Educational Research -- 7.1.1 The Possibilities for Methodological Ir/Responsibility -- 7.2 Methodology -- 7.3 Practice-Based Reflections on the Purposive Validity of Arts-Based Methods -- 7.3.1 Creating the Conditions to 'Listen' to Participants' Experiences in and of HE for Evaluation Purposes -- 7.3.2 Creating the Conditions for Participants to Author their Stories of HE -- 7.3.3 Concerns, Limitations and Improvement -- 7.4 Conclusion -- References -- Chapter 8 - Blind Running: 25 Pictures Per Page -- Acknowledgements -- References -- Chapter 9 - How Can Inspiration Be Encouraged in Art Learning? …”
    Libro electrónico
  19. 3139
    por Ratnayake, Rakhitha Nimesh
    Publicado 2013
    Tabla de Contenidos: “…-- Understanding the importance of code structuring -- Integrating Backbone.js and Underscore.js -- Creating a developer profile page with Backbone.js -- Structuring with Backbone.js and Underscore.js -- Displaying the projects list on page load -- Creating new projects from the frontend -- Integrating events to the Backbone.js views -- Validating and creating new models on the server -- Creating new models on the server -- Using PHPMailer for custom e-mail sending -- Usage of PHPMailer within the WordPress core -- Creating a custom version of the pluggable wp_mail function -- Loading PHPMailer inside plugins and creating custom functions -- Implementing user authentication with Opauth -- Configuring login strategies -- Building a LinkedIn app -- Process of requesting the strategies -- Initializing the Opauth library -- Authenticating users in our application -- Using third-party libraries and plugins -- Time for action -- Summary -- 9. …”
    Libro electrónico
  20. 3140
    por Russinovich, Mark E.
    Publicado 2009
    Tabla de Contenidos: “…Child Partitions -- Hardware Emulation and Support -- Kernel Transaction Manager -- Hotpatch Support -- Kernel Patch Protection -- Code Integrity -- Conclusion -- Management Mechanisms -- The Registry -- Viewing and Changing the Registry -- Registry Usage -- Registry Data Types -- Registry Logical Structure -- Transactional Registry (TxR) -- Monitoring Registry Activity -- Registry Internals -- Services -- Service Applications -- The Service Control Manager -- Service Startup -- Startup Errors -- Accepting the Boot and Last Known Good -- Service Failures -- Service Shutdown -- Shared Service Processes -- Service Tags -- Service Control Programs -- Windows Management Instrumentation -- Providers -- The Common Information Model and the Managed Object Format Language -- Class Association -- WMI Implementation -- WMI Security -- Windows Diagnostic Infrastructure -- WDI Instrumentation -- Diagnostic Policy Service -- Diagnostic Functionality -- Conclusion -- Processes, Threads, and Jobs -- Process Internals -- Data Structures -- Kernel Variables -- Performance Counters -- Relevant Functions -- Protected Processes -- Flow of CreateProcess -- Stage 1: Converting and Validating Parameters and Flags -- Stage 2: Opening the Image to Be Executed -- Stage 3: Creating the Windows Executive Process Object (PspAllocateProcess) -- Stage 4: Creating the Initial Thread and Its Stack and Context -- Stage 5: Performing Windows Subsystem-Specific Post-Initialization -- Stage 6: Starting Execution of the Initial Thread -- Stage 7: Performing Process Initialization in the Context of the New Process -- Thread Internals -- Data Structures -- Kernel Variables -- Performance Counters -- Relevant Functions -- Birth of a Thread -- Examining Thread Activity -- Limitations on Protected Process Threads -- Worker Factories (Thread Pools) -- Thread Scheduling…”
    Libro electrónico