Mostrando 5,901 - 5,920 Resultados de 9,986 Para Buscar 'Huntik~', tiempo de consulta: 1.22s Limitar resultados
  1. 5901
    Publicado 2021
    Tabla de Contenidos: “…Isolating critical workloads -- Hardening the default pod security policy -- Limiting pod access -- Creating network policies with Calico -- Monitoring runtime with Falco -- Ensuring cluster security and compliance -- Executing Kubernetes conformance tests -- Scanning cluster security configuration -- Executing the CIS Kubernetes benchmark -- Enabling audit logging -- Bonus security tips -- Deploying the security configurations -- Destroying the cluster -- Summary -- Further reading -- Chapter 7: Managing Storage and Stateful Applications -- Technical requirements -- Installing the required tools -- Implementation principles -- Understanding the challenges with stateful applications -- Tuning Kubernetes storage -- Understanding storage primitives in Kubernetes -- Choosing a persistent storage solution -- Deploying stateful applications -- Installing OpenEBS -- Deploying a stateful application on OpenEBS volumes -- Summary -- Further reading -- Chapter 8: Deploying Seamless and Reliable Applications -- Technical requirements -- Understanding the challenges with container images -- Exploring the components of container images -- Choosing the right container base image -- Reducing container image size -- Scanning container images for vulnerabilities -- Testing the download speed of a container image -- Applying container base images best practices -- Learning application deployment strategies -- Choosing the deployment model -- Monitoring deployments -- Using readiness and liveness container probes -- Scaling applications and achieving higher availability -- Summary -- Further reading -- Chapter 9: Monitoring, Logging, and Observability -- Technical requirements -- Understanding the challenges with Kubernetes observability -- Exploring the Kubernetes metrics -- Learning site reliability best practices -- Monitoring, metrics, and visualization…”
    Libro electrónico
  2. 5902
    Publicado 2017
    Tabla de Contenidos: “…A recursive approach -- Runtime analysis -- Asymptotic analysis -- Big O notation -- Composing complexity classes -- Omega notation (Ω) -- Theta notation (Θ) -- Amortized analysis -- Summary -- Chapter 4: Lists and Pointer Structures -- Arrays -- Pointer structures -- Nodes -- Finding endpoints -- Node -- Other node types -- Singly linked lists -- Singly linked list class -- Append operation -- A faster append operation -- Getting the size of the list…”
    Libro electrónico
  3. 5903
    Publicado 2016
    Tabla de Contenidos: “…-- From Your Perspective -- FORENSIC ANALYSIS OF THE ONION ROUTER -- TRACKING CRIMINALS USING TOR -- USED IN COMBINATION OF OTHER TOOLS AND METHODS -- TAILS -- RELATED TOR TOOLS AND APPLICATIONS -- Hidden Services -- SUMMARY -- REFERENCES -- 3 - Triaging Mobile Evidence -- LOGICAL DATA -- PHYSICAL DATA -- EXAMPLES OF LOGICAL AND PHYSICAL DATA -- WIRELESS CARRIERS -- MOBILE NETWORK OPERATORS -- MOBILE VIRTUAL NETWORK OPERATOR -- DETERMINING TARGET NUMBER -- FONEFINDER.NET -- NUMBER PORTABILITY ADMINISTRATION CENTER -- SEARCH.ORG -- SUBSCRIBER IDENTITY MODULE -- INTERNAL HARDWARE OF A SIM -- THE SIM FILE SYSTEM -- SIM SIZES AND EVOLUTION -- TYPICAL EVIDENCE -- SIM SECURITY-PIN AND PUK -- TRIAGING DEVICES -- DEVICES POWERED "ON" -- DEVICES LOCATED "OFF" -- MANUAL EXAMS -- TOOLS AVAILABLE -- Cellebrite USB Camera -- Fernico ZRT -- Project-A-Phone -- Eclipse Kit 3 -- SOFTWARE SOLUTIONS -- ScreenHunter -- Snagit -- Other Options -- CHAPTER SUMMARY POINTS -- REFERENCES FOR MANUAL TOOLS…”
    Libro electrónico
  4. 5904
    Publicado 2022
    Tabla de Contenidos: “…Function Called As Statements -- Chapter 12: Lookup Tables -- Table Data Structure -- Jagged Array Grids -- Preparing Table Data -- Lookup Table Function -- Input Variables and Data Source -- Control String -- Chapter 13: Small-Signal Functions -- AC Analysis -- AC Stimulus Function -- Noise Analysis -- White Noise Function -- Flicker Noise Function -- Look-Up Table Noise Functions -- Correlated Noise Sources -- Chapter 14: Filters -- Time-Domain Filters -- Absolute Delay Filter -- Transition Filter -- Slew Filter -- Frequency-Domain Filters -- Laplace Transform Filters -- Zero-Pole Filter -- Zero-Denominator Filter -- Numerator-Pole Filter -- Numerator-Denominator Filter -- The Z-Transform Filters -- Zero-Pole Filter -- Zero-Denominator Filter -- Numerator-Pole Filter -- Numerator-Denominator Filter -- Chapter 15: Events -- Event Control Statements -- Global Event Functions -- Monitored Event Functions -- Cross Function -- Last Crossing Function -- Above Function -- Timer Function -- Chapter 16: Runtime Support -- Elaboration Queries -- Port Connections -- Parameter Overrides -- Simulation Queries -- Analysis Type -- Kernel Parameters -- Dynamic Probing -- Solver Support -- Announcing Discontinuity -- Bounding Time Step -- Limiting Iteration Steps -- Simulation Control -- Announcing Severity -- Terminating Simulation -- Chapter 17: Input and Output -- File Management -- Opening Files -- File Positioning -- Error Status -- Detecting End-of-File -- Flushing Output -- Closing Files -- Reading Data -- Reading a Line from a File -- Reading Formatted Data -- Displaying and Writing Data -- Text Output -- File Output -- Writing Data to a String -- Escape Sequences -- Chapter 18: Generative Programming -- Generate Blocks -- Generate Statements -- Generate Regions -- Conditional Generation -- Looping Generation -- Hierarchy Scope and Names…”
    Libro electrónico
  5. 5905
    Publicado 2023
    Tabla de Contenidos: “…Part 3 - Advanced Topics -- Chapter 10: Consuming REST Services -- Technical requirements -- Using REST Services -- The Forget Me Not API architecture -- Creating the projects -- Fleshing out the models -- Examining the API domain objects -- Reviewing DTOs -- Other DTO files -- Understanding ForgetMeNot.APIClient -- Authentication -- Profile -- The Buddy region -- Using the API -- Creating the account -- Modifying the Login page -- Updating LoginPage -- The AccountService class -- Updating LoginViewModel -- Using AccountService to log in -- Setting up the Create Account page -- Setting up CreateAccountViewModel -- Handling the SignUp command -- What to do if it won't build -- Summary -- Quiz -- You try it -- Chapter 11: Exploring Advanced Topics -- Technical requirements -- Selecting data templates at runtime -- Declaring ItemTemplates as resources -- The DataTemplate selection -- The DataTemplateSelector class -- Adding the template selector to the page's resources -- Adding DataTemplateSelector to CollectionView -- Managing Visual State -- Defining the common visual states -- A button VisualState example -- Utilizing Community Toolkit behaviors -- Taking action with triggers -- Summary -- Quiz -- You try it -- Assessments -- Chapter 1, Assembling Your Tools and Creating Your First App -- Chapter 3, XAML and Fluent C# -- Chapter 4, MVVM and Controls -- Chapter 5, Advanced Controls -- Chapter 6, Layout -- Chapter 7, Understanding Navigation -- Chapter 8, Storing and Retrieving Data -- Chapter 9, Unit Testing -- Chapter 10, Consuming REST Services -- Chapter 11, Exploring Advanced Topics -- Index -- Other Books You May Enjoy…”
    Libro electrónico
  6. 5906
    Publicado 2024
    Tabla de Contenidos: “…Consolidating cloud deployment skills -- Avoiding bad behavior -- Creating a list of all the packages that were installed and used to develop the Python code -- Creating a GitHub repository -- Avoiding runtime errors -- Managing difficult libraries -- Deploying the app on Streamlit Cloud -- Summary -- Part 4: Advanced Techniques for Secure and Customizable Web Applications -- Chapter 12: Smart File Uploading - Advanced Techniques for Professional Web Applications -- Technical requirements -- Understanding the customized features of the file uploader -- Creating a new virtual environment -- Building the app skeleton -- Creating a radio button for the app menu -- Creating a suitable file uploader for web apps -- Simplifying web apps with smart components -- Summary -- Chapter 13: Creating a Secure Login and Signup Process for Web Applications -- Technical requirements -- Understanding the logic behind the login and signup page -- What is SHA-256 and why should we use it? …”
    Libro electrónico
  7. 5907
    por Gavin, Lee
    Publicado 2004
    Tabla de Contenidos: “…Business measures -- 7.1 Understand business measurements needs -- 7.2 Set up a simple measurements -- 7.2.1 Set up business measure / metric and associated locations -- 7.2.2 Set up final business measure -- 7.3 Set up a complex measurement -- 7.3.1 Set up the global internal and external cycles -- 7.4 Export business measures from Workbench -- 7.5 Import business measures to Monitor -- Chapter 8. Monitoring the runtime -- 8.1 Verify the business measures -- 8.2 Run time analysis -- 8.2.1 Workflow Web client -- 8.2.2 Workflow Dashboard -- 8.3 Historical data analysis -- 8.3.1 Set up reports -- 8.3.2 Report on the collected data -- Chapter 9. …”
    Libro electrónico
  8. 5908
    Publicado 2005
    Tabla de Contenidos: “…Comparing CCF to J2C Architecture -- 8.1 Common Connector Framework -- 8.1.1 The CCF client interfaces -- 8.1.2 CCF Infrastructure interfaces -- 8.1.3 VisualAge for Java EAB commands -- 8.1.4 Implementing the QoS with the RuntimeContext -- 8.1.5 Setting up the QoS for a sample IMS CCF application -- 8.2 Making the CCF artifacts J2EE compliant…”
    Libro electrónico
  9. 5909
    Publicado 2009
    Tabla de Contenidos: “…Programming -- 2.3 Defining the Model -- 2.4 Generating Code -- 2.5 The Runtime Framework -- 2.6 EMF and Modeling Standards -- Chapter 3 Model Editing with EMF.Edit -- 3.1 Displaying and Editing EMF Models -- 3.2 Item Providers -- 3.3 Command Framework -- 3.4 Generating EMF.Edit Code -- Chapter 4 Using EMF-A Simple Overview -- 4.1 Example Model: The Primer Purchase Order -- 4.2 Creating EMF Models and Projects -- 4.3 Generating Code -- 4.4 Running the Application -- 4.5 Continuing Development -- Part II: Defining EMF Models -- Chapter 5 Ecore Modeling Concepts -- 5.1 Ecore Model Uses -- 5.2 The Ecore Kernel -- 5.3 Structural Features -- 5.4 Behavioral Features -- 5.5 Classifiers -- 5.6 Packages and Factories -- 5.7 Annotations -- 5.8 Modeled Data Types -- 5.9 Ecore and User Models -- Chapter 6 UML -- 6.1 UML Packages -- 6.2 UML Specification for Classifiers -- 6.3 UML Specification for Attributes -- 6.4 UML Specification for References -- 6.5 UML Specification for Operations -- 6.6 Documentation -- 6.7 Ecore Properties in Rational Rose -- Chapter 7 Java Source Code -- 7.1 Java Specification for Classes -- 7.2 Java Specification for Enumerated Types -- 7.3 Java Specification for Packages -- 7.4 Java Specification for Maps -- 7.5 Java Specification for Annotations -- Chapter 8 Extended Ecore Modeling -- 8.1 Feature Maps -- 8.2 Modeling with Feature Maps -- Chapter 9 XML Schema -- 9.1 Schema -- 9.2 Simple Type Definitions -- 9.3 Complex Type Definitions -- 9.4 Attribute Declarations -- 9.5 Element Declarations -- 9.6 Model Groups -- 9.7 Wildcards -- 9.8 Annotations…”
    Libro electrónico
  10. 5910
    por Preston, Mike
    Publicado 2013
    Tabla de Contenidos: “…Understanding vSphere Storage Concepts and Methodologies -- Storage virtualization -- Supported filesystems -- VMFS -- NFS -- Raw disk -- Storage naming -- Viewing device identifiers -- Within the vSphere Client -- Within ESXi Shell -- The many ways vSphere identifies storage -- Friendly names -- Identifiers -- NAA identifiers -- T10 identifiers -- IQN identifiers -- MPX identifiers -- Runtime names -- The vSphere Pluggable Storage Architecture -- Pluggable Storage Architecture (PSA) roles and commands -- Multipathing Plugin - the VMware Native Multipathing Plugin roles and commands -- Storage Array Type Plugin roles and commands -- Path Selection Plugin roles and commands -- An I/O request - from start to finish -- Summary -- 2. …”
    Libro electrónico
  11. 5911
    Publicado 2020
    Tabla de Contenidos: “…-- Maintainer Mode -- Cutting Through the Noise -- Nonrecursive Automake -- Summary -- 7 BUILDING LIBRARIES WITH LIBTOOL -- The Benefits of Shared Libraries -- How Shared Libraries Work -- Using Libtool -- Installing Libtool -- Adding Shared Libraries to Jupiter -- Summary -- 8 LIBRARY INTERFACE VERSIONING AND RUNTIME DYNAMIC LINKING -- System-Specific Versioning -- The Libtool Library Versioning Scheme -- Using libltdl -- Converting to Libtool's ltdl Library -- Summary -- 9 UNIT AND INTEGRATION TESTING WITH AUTOTEST -- Autotest Overview -- Wiring Up Autotest -- Adding a Test -- Unit Testing vs. …”
    Libro electrónico
  12. 5912
    Publicado 2019
    Tabla de Contenidos: “…Callbacks, hooks, and runtime introspection -- 15.1. Callbacks and hooks -- 15.2. …”
    Libro electrónico
  13. 5913
    Tabla de Contenidos: “…How to react in real time through seamless flow of information -- 5.1 Introduction -- 5.2 General strategy -- 5.3 Solution components -- 5.3.1 Access and collaboration via portal technology -- 5.3.2 Access and collaboration via Lotus Workplace -- 5.3.3 Business process execution -- 5.3.4 Enterprise Service Bus -- 5.3.5 Common resource and information model -- 5.4 Scenario -- 5.4.1 Business context -- 5.4.2 Current environment -- 5.4.3 Business objectives -- 5.4.4 Technical objectives -- 5.4.5 Solution approach -- 5.4.6 Benefits and summary -- 5.5 Product positioning -- 5.6 Linkages -- 5.6.1 XML -- 5.6.2 DB2 XML Extender -- 5.6.3 DB2 XML Extender and WebSphere MQ -- 5.6.4 Integration of applications using WebSphere MQ products -- 5.6.5 Web Services integration -- 5.6.6 Web Services Object Runtime Framework -- 5.6.7 DADX overview and structure -- 5.7 Glimpse of the future -- 5.7.1 Lotus Workplace -- 5.7.2 Information Integrator updates -- 5.8 Summary -- Appendix A. …”
    Libro electrónico
  14. 5914
    Publicado 2023
    Tabla de Contenidos: “…-- Installing Toaster -- Starting Toaster -- Building an image for QEMU -- Summary -- Chapter 4: Meeting the BitBake Tool -- Understanding the BitBake tool -- BitBake metadata collections -- Metadata types -- Summary -- Chapter 5: Grasping the BitBake Tool -- Parsing metadata -- Dependencies -- Preferring and providing recipes -- Fetching the source code -- Remote file downloads -- Git repositories -- Optimizing the source code download -- Disabling network access -- Understanding BitBake's tasks -- Summary -- Chapter 6: Detailing the Temporary Build Directory -- Detailing the build directory -- Constructing the build directory -- Exploring the temporary build directory -- Understanding the work directory -- Understanding the sysroot directories -- Summary -- Chapter 7: Assimilating Packaging Support -- Using supported package formats -- List of supported package formats -- Choosing a package format -- Running code during package installation -- Understanding shared state cache -- Explaining package versioning -- Specifying runtime package dependencies…”
    Libro electrónico
  15. 5915
    Publicado 2023
    Tabla de Contenidos: “…-- Introducing distributed tracing -- Span -- Tracing - building blocks -- Reviewing context propagation -- In-process propagation -- Out-of-process propagation -- Ensuring consistency and structure -- Building application topology -- Resource attributes -- Performance analysis overview -- The baseline -- Investigating performance issues -- Summary -- Questions -- Further reading -- Chapter 2: Native Monitoring in .NET -- Technical requirements -- Building a sample application -- Log correlation -- On-demand logging with dotnet-monitor -- Monitoring with runtime counters -- Enabling auto-collection with OpenTelemetry -- Installing and configuring OpenTelemetry -- Exploring auto-generated telemetry -- Debugging -- Performance -- Summary -- Questions -- Chapter 3: The .NET Observability Ecosystem -- Technical requirements -- Configuring cloud storage -- Using instrumentations for popular libraries -- Instrumenting application -- Leveraging infrastructure -- Configuring secrets -- Configuring observability on Dapr -- Tracing -- Metrics -- Instrumenting serverless environments -- AWS Lambda -- Azure Functions -- Summary -- Questions -- Chapter 4: Low-Level Performance Analysis with Diagnostic Tools -- Technical requirements -- Investigating common performance problems -- Memory leaks -- Thread pool starvation -- Profiling -- Inefficient code -- Debugging locks -- Using diagnostics tools in production -- Continuous profiling -- The dotnet-monitor tool -- Summary -- Questions -- Part 2: Instrumenting .NET Applications…”
    Libro electrónico
  16. 5916
    por Maufort, Marc
    Publicado 2024
    Tabla de Contenidos: “…Beebee) -- Métropoles africaines du Sud global: de la hantise coloniale aux mirages de la mondialisation (Yves Clavaron) -- Portraying Power: Miguel Ángel Asturias's Caudillo and Francisco Toledo's Masked "Self-Portraits" (Lois Parkinson Zamora) -- Comparatisme et imaginaire du complot (Chloé Chaudet) -- The Literary Universal in Comparative Literature (Zhang Longxi) -- Essai critique / Review Essay -- From Maghrib to Tamazgha: The Ubiquitous and Polyphonic Literary Maghrib (Gonzalo Fernández Parrilla) -- Comptes rendus / Book Reviews -- Dirk Meyer. …”
    Libro electrónico
  17. 5917
    Publicado 2024
    Tabla de Contenidos: “…-- Managing Fabric capacities -- Managing Spark job configurations -- Starter pools -- Custom Spark pools -- Spark runtime -- High concurrency -- Automatically tracking machine learning experiments and models -- Spark properties/configuration -- Library management -- Auto-tune -- Spark utility (MSSparkUtils) -- Summary -- Part 4: Security and Developer Experience -- Chapter 9: Security and Governance Overview -- Securing the Microsoft Fabric platform -- Guest users -- Conditional access -- Securing Microsoft Fabric workspaces and items -- Workspace-level permissions -- Item-level permissions -- Understanding governance and compliance in Microsoft Fabric -- Domains -- Microsoft Purview -- Summary -- Chapter 10: Continuous Integration and Continuous Deployment (CI/CD) -- Technical requirements -- Understanding the end-to-end flow -- Connecting to a Git repo with Azure DevOps -- Working on a new feature or release -- Creating and executing a deployment pipeline -- Managing database code for a Fabric data warehouse -- Managing database code with the SQL Database Projects extension -- Summary -- Part 5: AI Assistance with Copilot Integration -- Chapter 11: Overview of AI Assistance and Copilot Integration -- Technical requirements -- What is Copilot in Fabric? …”
    Libro electrónico
  18. 5918
    Publicado 2024
    Tabla de Contenidos: “…-- Program structure -- Console application -- Building a forms application -- The Object Pascal language phrasebook -- Tokens -- Constants -- Types -- Inline variables declaration -- Sets and arrays -- Helpers -- Generics -- Anonymous code -- Operator overloading -- Runtime type information -- Custom attributes -- Summary -- Chapter 3: Packing Up Your Toolbox -- Technical requirements -- Working with files and streams -- Working with JSON -- Writing JSON -- Reading JSON -- Using the JSON wizard in Delphi 12 -- Working with XML -- Summary -- Chapter 4: Using the Parallel Programming Library -- Technical requirements -- Using threads -- Access synchronization -- Calling Synchronize -- Atomic operations -- Using a critical section -- Using TMonitor -- Exploring the Parallel Programming Library -- Parallel loops -- Using tasks -- The beauty of futures -- Summary -- Part 2: Going Mobile -- Chapter 5: Playing with FireMonkey -- Technical requirements -- Drawing in code -- Get moving with timers -- Precise timing -- The power of parenting -- Shapes -- Animations -- Touching the screen -- Touch -- Gestures -- Multi-touch -- Game of Memory -- Designing the game -- Working with images -- Designing the user interface -- Aligning, anchoring, and margins -- Layouts -- Building the main form of the game -- Storing the game's configuration…”
    Libro electrónico
  19. 5919
    Publicado 2023
    Tabla de Contenidos: “…Microsoft Defender -- Azure pentesting tools -- Prowler -- MFASweep -- ScoutSuite -- Exploiting Azure applications -- Prowler -- MFASweep -- ScoutSuite -- Summary -- Further reading -- Chapter 9: Pentesting Containerized Applications in Azure -- Technical requirements -- How containerization works -- How Docker works in Azure -- How Kubernetes works in Azure -- Docker and Kubernetes pentesting techniques in Azure -- kube-hunter -- kdigger -- Summary -- Further reading -- Part 4: Pentesting GCP -- Chapter 10: Security Features in GCP -- Introduction to GCP -- Frequently used GCP SaaS applications -- Google Workspace -- Google App Engine -- Cost Management -- Google Cloud app -- Google Marketing Platform -- GCP IaaS services -- Compute Engine -- Cloud Storage -- Shielded VMs -- Sole-tenant nodes -- GCP PaaS services -- Cloud SDK -- Cloud SQL -- Cloud Run -- GKE -- Anthos -- GCP security controls and tools -- Security controls -- Security tools -- Summary -- Further reading -- Chapter 11: Pentesting GCP Features through Serverless Applications and Tools -- Technical requirements -- GCP free tier -- Launching a GCP network -- Using GCP Cloud Shell -- GCP native security tools -- Exploring the GCP console -- Installing GCP pentesting tools -- Prowler -- GCPBucketBrute -- GCP Scanner -- Exploiting GCP applications -- Prowler -- GCPBucketBrute -- GCP Scanner -- Summary -- Further reading -- Chapter 12: Pentesting Containerized Applications in GCP -- Technical requirements -- How containerization works -- VMs -- Containers -- How Docker works in GCP -- How Kubernetes works in GCP -- Docker and Kubernetes pentesting techniques in GCP -- Deploying Docker -- Deploying Kubernetes -- Trivy -- Summary -- Further reading -- Chapter 13: Best Practices and Summary -- Content review -- Questions -- Answers -- Your cloud pentesting toolkit…”
    Libro electrónico
  20. 5920
    por Hehle, Friederike
    Publicado 2011
    Tabla de Contenidos:
    Libro electrónico