Mostrando 6,041 - 6,060 Resultados de 9,986 Para Buscar 'Huntik~', tiempo de consulta: 1.29s Limitar resultados
  1. 6041
    Publicado 2024
    Tabla de Contenidos: “…- redux -- Discovering value types -- Booleans -- Integers -- Real numbers -- Char -- Typing explained -- Dynamic versus static typing -- Casting variables -- Navigating reference types -- Arrays -- Strings -- Hashtables -- Splatting - a cool use for hashtables -- Summary -- Exercises -- Further reading -- Chapter 5: PowerShell Control Flow - Conditionals and Loops -- An introduction to IDEs and VS Code -- Installing VS Code -- Configuring VS Code for PowerShell -- Conditional control - if, else, elseif, and switch -- The if statement -- The switch statement -- Loops - foreach, do while, do until, while, for -- The foreach loop statement -- The do while and do until loop statements -- The while loop -- The for loop -- Breaking and continuing -- The break statement -- The continue statement -- Let's play a game -- Summary -- Exercises -- Further reading -- Chapter 6: PowerShell and Files - Reading, Writing, and Manipulating Data -- Understanding formatting -- Format-List -- Format-Table -- Format-Wide -- Formatting gotchas -- Writing a text file -- Using ConvertTo- and Export- cmdlets -- CSV -- XML -- HTML -- Handling files -- A brief note about PSProviders and PSDrives -- Item- cmdlets -- Working with files -- Get-Content -- Import- cmdlets -- Let's have some fun - measuring the most frequent words in a text file -- Summary -- Exercises -- Further reading -- Chapter 7: PowerShell and the Web - HTTP, REST, and JSON -- Working with HTTP -- Why don't we see Forms information in PowerShell 7? …”
    Libro electrónico
  2. 6042
    Publicado 2018
    Tabla de Contenidos: “…Marquardt, Katelin R. Knight, Hunter Bane, Alice Barber and Robert K. DeLong ZnO Nanoparticles Protect RNA from Degradation Better than DNA Reprinted from: Nanomaterials 2017, 7, 378, doi: 10.3390/nano7110378 -- Jin Yu, Hyeon-Jin Kim, Mi-Ran Go, Song-Hwa Bae and Soo-Jin Choi ZnO Interactions with Biomatrices: Effect of Particle Size on ZnO-Protein Corona Reprinted from: Nanomaterials 2017, 7, 377, doi: 10.3390/nano7110377 -- Alberto Casu, Andrea Lamberti, Stefano Stassi and Andrea Falqui Crystallization of TiO2 Nanotubes by In Situ Heating TEM Reprinted from: Nanomaterials 2018, 8, 40, doi: 10.3390/nano8010040…”
    Libro electrónico
  3. 6043
    Publicado 2024
    Tabla de Contenidos: “…Identifying organizational infrastructure -- Data leakage on job websites -- Finding vulnerable systems using Shodan -- Discovering exposed systems with Censys -- Mapping external systems using Maltego -- Identifying infrastructure with Netcraft -- Using Recon-ng for data harvesting -- Data collection with theHarvester -- Harvesting employees' data using Hunter -- Automating social media reconnaissance with Sherlock -- Summary -- Further reading -- Chapter 6: Active Reconnaissance -- Technical requirements -- Understanding active information -- Profiling websites using EyeWitness -- Exploring active scanning techniques -- Changing your MAC address -- Performing live host discovery -- Identifying open ports, services, and operating systems -- Using scanning evasion techniques -- Avoiding detection with decoys -- Using MAC and IP spoofing techniques -- Stealth scanning techniques -- Enumerating network services -- Enumerating SMB services -- Enumerating SMTP services -- Enumerating SNMP services -- Discovering data leaks in the cloud -- Summary -- Further reading -- Chapter 7: Performing Vulnerability Assessments -- Technical requirements -- Getting started with Nessus -- Part 1 - installing Nessus -- Part 2 - identifying vulnerabilities -- Part 3 - vulnerability analysis -- Part 4 - exporting vulnerability reports -- Vulnerability identification using Nmap -- Working with Greenbone Vulnerability Manager -- Part 1 - installing GVM -- Part 2 - vulnerability identification -- Part 3 - vulnerability analysis and reporting -- Using web application scanners -- WhatWeb -- Nmap -- Nikto -- Metasploit -- WPScan -- Summary -- Further reading -- Chapter 8: Understanding Network Penetration Testing -- Technical requirements -- Introduction to network penetration testing -- Working with bind and reverse shells -- Working with remote shells using Netcat…”
    Libro electrónico
  4. 6044
    Publicado 2024
    Tabla de Contenidos: “…Dead-letter queues (DLQs) -- Event sourcing -- Command query responsibility segregation (CQRS) -- Securing Lambda functions -- Code integrity -- Secure environment variables -- Runtime protection -- Lambda function versioning and aliases -- Access control -- Networking -- Execution limits -- Monitoring and logging -- Summary -- Questions -- Answers -- Further reading -- Chapter 8: Secure Design Patterns for Multi-tenancy in Shared Environments -- Understanding multi-tenancy concepts and challenges -- Definition and importance of multi-tenancy -- Challenges in multi-tenancy -- Multi-tenancy design patterns -- The silo model -- The pool model -- The bridge model -- Choosing the right design pattern -- Implementing secure data isolation techniques -- Network-level isolation -- Database-level Isolation -- Compute-level Isolation -- Application-level isolation -- Encryption-level isolation -- Managing access control for tenants -- Tenant authentication -- Implementing access control -- Tenant-managed access control -- Summary -- Questions -- Answers -- Further readings -- Chapter 9: Automate-Everything to Build Immutable and Ephemeral Resources -- From manual to programmatic management -- Manual and programmatic management defined -- Risks of manual resource management -- Shift to programmatic management -- Snowflake versus Phoenix systems -- IaC frameworks -- Benefits of adopting IaC -- Automated security testing -- Treating infrastructure as software -- Security testing in IaC pipelines -- Tools for automated security scanning -- Security best practices for IaC -- Apply least privileges -- Handle secrets securely -- Ensure compliance -- The Automate-Everything approach -- Summary -- Questions -- Answers -- Further reading -- Part 3: Monitoring, Automation and Continuous Improvement -- Chapter 10: Advanced Logging, Auditing, and Monitoring in AWS…”
    Libro electrónico
  5. 6045
    Publicado 2023
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright -- Dedication -- Contributors -- Table of Contents -- Preface -- Part 1: Introduction to WinUI and Windows Applications -- Chapter 1: Introduction to WinUI -- Technical requirements -- Before UWP - Windows 8 XAML applications -- Windows application UI design -- Windows Runtime (WinRT) -- User backlash and the path forward to Windows 10 -- Windows 10 and UWP application development -- Language choice with UWP development -- Lifting app restrictions -- UWP backward compatibility -- What is XAML? …”
    Libro electrónico
  6. 6046
    Publicado 2024
    Tabla de Contenidos: “…Installing Anaconda on Mac OS X -- Downloading the Datasets and Example Code -- Using Jupyter Notebook -- Starting Jupyter Notebook -- Stopping the Jupyter Notebook server -- Defining the code repository -- Defining a new folder -- Creating a new notebook -- Adding notebook content -- Exporting a notebook -- Removing a notebook -- Importing a notebook -- Understanding the datasets used in this book -- Chapter 4 Working with Google Colab -- Defining Google Colab -- Understanding what Google Colab does -- Considering the online coding difference -- Using local runtime support -- Working with Notebooks -- Creating a new notebook -- Opening existing notebooks -- Using Google Drive for existing notebooks -- Using GitHub for existing notebooks -- Using local storage for existing notebooks -- Saving notebooks -- Using Drive to save notebooks -- Using GitHub to save notebooks -- Using GitHub gists to save notebooks -- Downloading notebooks -- Performing Common Tasks -- Creating code cells -- Creating text cells -- Creating special cells -- Editing cells -- Moving cells -- Using Hardware Acceleration -- Executing the Code -- Viewing Your Notebook -- Displaying the table of contents -- Getting notebook information -- Checking code execution -- Sharing Your Notebook -- Getting Help -- Part 2 Getting Your Hands Dirty with Data -- Chapter 5 Working with Jupyter Notebook -- Using Jupyter Notebook -- Working with styles -- Getting Python help -- Using magic functions -- Obtaining the magic functions list -- Working with magic functions -- Discovering objects -- Getting object help -- Obtaining object specifics -- Using extended Python object help -- Restarting the kernel -- Restoring a checkpoint -- Performing Multimedia and Graphic Integration -- Embedding plots and other images -- Loading examples from online sites -- Obtaining online graphics and multimedia…”
    Libro electrónico
  7. 6047
    Publicado 2024
    Tabla de Contenidos: “…. -- See also -- Creating visualizations from runtime fields -- Getting ready…”
    Libro electrónico
  8. 6048
    por Dowswell, Kurt
    Publicado 2024
    Tabla de Contenidos: “…Expanding Your Conversation to a New Window -- Shifting the Conversation to the Right -- Utilizing Inline Chat -- Discovering Quick Chat -- Defining Prompt Engineering with Copilot Chat -- Understanding the Basics -- Prompting for Code -- Prompting for Solutions -- Having a Single Clear Objective -- Specifying a Specific Technology -- Keeping Prompts Short -- Gaining Context in Chat -- Open Tabs Context -- Editor Context -- File Context -- Selection Context -- Commanding Your Conversation with Precision -- Querying with @workspace -- Learning with /explain -- Generating Tests with /tests -- Finding a Fix with /fix -- Scaffolding with /new -- Crafting with /newNotebook -- Engaging with @vscode -- Inquiring with /api -- Learning with @terminal -- Conclusion -- Part III Practical Applications of GitHub Copilot -- Chapter 5 Learning a New Programming Language -- Introducing Language Education with Copilot -- Setting Up Your Development Environment -- Prerequisites -- Setup Guide -- Learning the Basics -- Prerequisites -- Learning C# with Copilot -- Creating a Console Application -- Prerequisites -- Creating a C# Console Application with Copilot -- Explaining Code with Copilot -- Adding New Code -- Learning to Test -- Creating Context with Selection -- Creating Context with Tags -- Running Tests -- Conclusion -- Reference -- Chapter 6 Writing Tests with Copilot -- Establishing the Example Project -- Prerequisites -- Adding Unit Tests to Existing Code -- Driving Unit Test Creation with Comments -- Using Inline Chat to Generate Tests -- Exploring Behavior-Driven Development with Copilot -- Adding User Accounts -- Setup -- End-to-End Tests -- Conclusion -- Chapter 7 Diagnosing and Resolving Bugs -- Establishing the Example Project -- Prerequisites -- Fixing Syntax Errors -- Resolving Runtime Exceptions -- Setup -- Resolving Terminal Errors -- Conclusion…”
    Libro electrónico
  9. 6049
    Publicado 2022
    Tabla de Contenidos: “…Chapter 6: Using Query Store for Query Performance and Execution Plans -- Query Store Function and Design -- Information Collected by Query Store -- Query Runtime Data -- Controlling Query Store -- Capture Mode -- Query Store Reporting -- Plan Forcing -- Forcing Query Hints -- Optimized Plan Forcing -- Query Store for Upgrades -- Summary -- Chapter 7: Execution Plan Cache Behavior -- Querying the Plan Cache -- Execution Plan Caching and Plan Reuse -- Ad Hoc Workload -- Optimize for Ad Hoc Workload -- Simple Parameterization -- Forced Parameterization -- Prepared Workload -- Stored Procedure -- Stored Procedure Compiled on Initial Execution -- Performance Benefits of Stored Procedures -- Nonperformance Benefits of Stored Procedures -- sp_executesql -- Prepare/Execute Model -- Query Hash and Query Plan Hash -- Execution Plan Cache Recommendations -- Explicitly Parameterize Values in Your Query -- Use Stored Procedures Where You Can -- Use sp_executesql As an Alternative to Stored Procedures -- Take Advantage of the Prepare/Execute Model -- Avoid Ad Hoc Queries -- Enable Optimize For Ad Hoc -- Summary -- Chapter 8: Query Recompilation -- Benefits and Drawbacks of Recompilation -- Identifying the Statement Being Recompiled -- Analyzing Causes of Recompilation -- Deferred Object Resolution -- Recompilation on a Table -- Recompilation on a Temporary Table -- Avoiding Recompiles -- Avoid Interleaving DDL and DML Statements -- Reduce Recompilation Caused by Statistics Changes -- Use the KEEPFIXED PLAN Hint -- Disable Automatic Statistics Maintenance on a Table -- Use Table Variables -- Use Temporary Tables Across Multiple Scopes -- Avoid Changing SET Options Within a Batch -- Controlling Recompile Results -- Plan Forcing -- Query Hints -- Plan Guides -- Hint Forcing -- Summary -- Chapter 9: Index Architecture -- What Is a Rowstore Index?…”
    Libro electrónico
  10. 6050
    Publicado 2024
    Tabla de Contenidos: “…Installing Docker -- Running MongoDB with a container -- Running MongoDB with Docker Compose -- Adding Docker commands to package.json -- Connecting to MongoDB -- Other ways to install MongoDB -- How to load secrets in Node.js -- Environment variables -- The .env file -- dotenv -- Using an ORM - Mongoose -- Migrating a web application to MongoDB -- Installing dependencies -- Managing the secrets -- Migrating the data layer -- Testing our MongoDB integration layer -- Update the utilities -- Refactoring the test suite -- Some tests must change -- Checking the coverage -- Summary -- Further reading -- Chapter 13: User Authentication and Authorization with Passport.js -- Technical requirements -- Understanding modern authentication and authorization -- Authentication -- Authorization -- JWT in a nutshell -- The process -- The theory -- Cryptography 101 -- JWT structure -- JWT.io -- Understanding Passport.js fundamentals -- Adding authentication and authorization to our web application -- Clone the base project -- Setup -- Run the tests -- The UI changes -- Added dependencies -- Changes in the frontend -- Added a new store for users -- JWT utilities -- Adding new routes -- Improved testing utilities -- Test case changes -- Test coverage -- Summary -- Further reading -- Chapter 14: Error Handling in Node.js -- Technical requirements -- Exploring the types of errors -- Syntax errors -- Runtime errors -- Throwing meaningful errors -- The error object -- Custom errors -- Managing errors in Express -- Error-handling middleware -- Custom errors -- Gracefully shutting down the application -- Events -- Exit codes -- Avoiding zombie processes -- Summary -- Further reading -- Chapter 15: Securing Web Applications -- Technical requirements -- The importance of security -- Social engineering -- Risks in the supply chain -- The business impact…”
    Libro electrónico
  11. 6051
    Publicado 2024
    Tabla de Contenidos: “…Worker Nodes -- Creating a Highly Available Kubernetes Cluster with Kubespray and Ansible -- Available Options to Deploy Kubernetes -- Prerequisites and Initial Setup -- Creating The Inventory -- Creating the Cluster -- How Kubespray Works -- Step 1: Pre-Configuration Checks and Setup -- Step 2: Setting Up Container Runtime -- Step 3: Network Plugin Installation -- Step 4: Kubernetes Components Installation -- Step 5: Initialization of the First Control Plane Node -- Step 6: Setting Up etcd Cluster -- Step 7: Joining Additional Control Plane Nodes -- Step 8: Joining Worker Nodes -- Step 9: Cluster Configuration With Addons -- Step 10: Cluster Verification And Health Checks -- Step 11: Security Configuration -- Step 12: Applying Custom Configurations -- Step 13: Cluster Ready For Deployment -- Start Using The Cluster -- Deploying to Kubernetes with Ansible -- Deploying to Kubernetes with Ansible and the K8s Module -- Using Remote Manifests -- Inline Manifests -- Validating Kubernetes Definitions -- Managing Multiple Clusters -- Patching Resources -- Restarting Deployments -- Deploying to Kubernetes with Ansible and Helm -- Templating Kubernetes Resources With Ansible -- Troubleshooting Kubernetes with Ansible -- Creating Generic Debug Tasks to View Kubernetes Resources -- Viewing Kubernetes Pod Logs with Ansible -- Ansible + Kubernetes = A Powerful Combination -- Ansible Cheat Sheet -- Installing Ansible -- On Linux -- On macOS -- On Windows -- Configuring Ansible -- Inventory -- Setting Up the Inventory File (INI) -- Setting Up the Inventory File (YAML) -- Ansible Host Variables -- Testing Your Setup -- Playbook Structure -- Playbook Keywords -- Common Modules -- Running a Command -- Running a Shell Command -- Running a Raw Command -- Copying a File -- Installing a Package -- Restarting a Service -- Copying a File with Permissions…”
    Libro electrónico
  12. 6052
    Publicado 2005
    “…The marriage of two strong-minded people provides the spark for a comic confrontation between the sexes: The "shrew," Katharina, is so ill-tempered she seems unlikely to find a husband. Her father refuses to let her younger sister marry until Katherina is off his hands. …”
    +información
    DVD
  13. 6053
    Publicado 1855
    Libro
  14. 6054
    Publicado 2018
    “…Unlike other works on the subject, it is Africa-wide in its scope, with case studies in Ethiopia, Kenya, Malawi, Nigeria, Rwanda, and South Africa. …”
    Libro electrónico
  15. 6055
    Publicado 2020
    Tabla de Contenidos: “…8.1 Introduction 179 -- 8.2 Scenario and Application 182 -- 8.2.1 Concept Definition 182 -- 8.2.2 Fog-enabled IoT Application 184 -- 8.2.3 Characteristics and Open Challenges 185 -- 8.2.4 Orchestration Requirements 187 -- 8.3 Architecture: A Software-Defined Perspective 188 -- 8.3.1 Solution Overview 188 -- 8.3.2 Software-Defined Architecture 189 -- 8.4 Orchestration 191 -- 8.4.1 Resource Filtering and Assignment 192 -- 8.4.2 Component Selection and Placement 194 -- 8.4.3 Dynamic Orchestration with Runtime QoS 195 -- 8.4.4 Systematic Data-Driven Optimization 196 -- 8.4.5 Machine-Learning for Orchestration 197 -- 8.5 Fog Simulation 198 -- 8.5.1 Overview 198 -- 8.5.2 Simulation for IoT Application in Fog 199 -- 8.5.3 Simulation for Fog Orchestration 201 -- 8.6 Early Experience 202 -- 8.6.1 Simulation-Based Orchestration 202 -- 8.6.2 Orchestration in Container-Based Systems 206 -- 8.7 Discussion 207 -- 8.8 Conclusion 208 -- Acknowledgment 208 -- References 208 -- 9 A Decentralized Adaptation System for QoS Optimization 213 /Nanxi Chen, Fan Li, Gary White, Siobh©Łn Clarke, and Yang Yang -- 9.1 Introduction 213 -- 9.2 State of the Art 217 -- 9.2.1 QoS-aware Service Composition 217 -- 9.2.2 SLA (Re-)negotiation 219 -- 9.2.3 Service Monitoring 221 -- 9.3 Fog Service Delivery Model and AdaptFog 224 -- 9.3.1 AdaptFog Architecture 224 -- 9.3.2 Service Performance Validation 227 -- 9.3.3 Runtime QoS Monitoring 232 -- 9.3.4 Fog-to-Fog Service Level Renegotiation 235 -- 9.4 Conclusion and Open Issues 240 -- References 240 -- 10 Efficient Task Scheduling for Performance Optimization 249 /Yang Yang, Shuang Zhao, Kunlun Wang, and Zening Liu -- 10.1 Introduction 249 -- 10.2 Individual Delay-minimization Task Scheduling 251 -- 10.2.1 System Model 251 -- 10.2.2 Problem Formulation 251 -- 10.2.3 POMT Algorithm 253 -- 10.3 Energy-efficient Task Scheduling 255 -- 10.3.1 Fog Computing Network 255 -- 10.3.2 Medium Access Protocol 257 -- 10.3.3 Energy Efficiency 257 -- 10.3.4 Problem Properties 258.…”
    Libro electrónico
  16. 6056
    Libro
  17. 6057
    por Heaton, J. Henniker
    Publicado 1879
    Libro
  18. 6058
    por Henniker, Frederick
    Publicado 1824
    Libro
  19. 6059
    Publicado 2018
    Tabla de Contenidos: “…-- Query Store architecture -- Enabling and configuring Query Store -- Enabling Query Store with SSMS -- Enabling Query Store with Transact-SQL -- Configuring Query Store -- Query Store default configuration -- Query Store recommended configuration -- Disabling and cleaning Query Store -- Query Store in action -- Capturing the Query info -- Capturing plan info -- Collecting runtime statistics…”
    Libro electrónico
  20. 6060
    Publicado 2021
    Tabla de Contenidos: “…Problems That Are Likely to Happen -- SY-SUBRC -- BAPIs -- BDCs -- Field Symbols -- Problems That Really Shouldn't Happen -- Self-Repair: Example 1 -- Self-Repair: Example 2 -- Problems That Should Never, Ever Happen -- Spotting the Impossible -- Dealing with the Impossible -- Dealing with Instability: Using Humans -- What's Wrong #1 -- What's Wrong #2 -- Conclusion -- Recommended Reading -- Chapter 5: Performance: The Third Pillar of Code Quality -- CPO Concept -- Daily Dumps -- Annual In-House CPO -- Static Checks -- Geometric Loops -- Secondary Indexes for Internal Tables -- Runtime Checks -- ST05 in General -- Identical SELECTS -- How to Spot the Problem -- Strategies to Deal with the Problem -- Real-Life Example -- Stuttering -- Asking Stupid Questions -- Reading More Data Than Needed -- Selecting More Columns Than You Need -- Selecting More Rows Than You Need -- The Behavior Never Made Sense -- The Behavior No Longer Makes Sense -- The Behavior Makes Sense -- Existence Checks -- Multiple Reads on the Same Table -- Contract Example -- Partner Function Example -- Shipment Cost Example -- Using FOR ALL ENTRIES -- Indexes -- Indexes: Always Using One -- Indexes: Missing the First Field -- Indexes: SKIP SCAN -- Nested SELECTs -- "Bad" Joins on Database Tables -- Postmortem Checks -- Standard SAP Transactions for Troubleshooting Performance Problems -- SAT -- ST04 -- SRTCM -- Technical Attributes of Database Tables -- Indexes -- Pointless Index -- Terrible Index -- Really Good Index -- Buffering -- Possible Buffering Settings -- Example of How Buffering Can Help -- Common Misconception About Generic Buffering -- How to Decide Which Z Tables to Buffer -- Postmortem Tricks -- Batch Jobs -- Deadlocks -- Sneaky Tricks -- Database Reads in a Loop -- Using Standard SAP "Buffering" Modules -- When to Use Them -- KNA1_SINGLE_READER -- Prefilling Buffers…”
    Libro electrónico