Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 380
- Development 355
- History 349
- Application software 303
- Engineering & Applied Sciences 237
- Computer Science 177
- Filosofía 152
- Computer programs 138
- Management 129
- Crítica e interpretación 124
- Computer networks 113
- Computer security 113
- Web site development 109
- Java (Computer program language) 107
- Security measures 102
- Computer programming 97
- Cloud computing 94
- Computer software 94
- Microsoft .NET Framework 94
- Historia y crítica 93
- Internet programming 80
- Programming 76
- Biblia 75
- Software engineering 71
- Cristianismo 70
- Artificial intelligence 69
- Job hunting 68
- History and criticism 66
- Design 65
- Business & Economics 63
-
8861Publicado 2012“…A .NET assembly can be called from within a message flow and the WebSphere Message Broker runtime can host and run .NET code. Solutions explored in this book cover connectivity to applications using Windows Communications Framework (WCF), Microsoft Message Queuing, Microsoft Dynamics CRM, and other Microsoft applications. …”
Libro electrónico -
8862Publicado 2014“…In addition, the book describes how to use the enterprise search capability for the discovery and retrieval of documents using various query and visual navigation techniques, and customization of crawling, parsing, indexing, and runtime search to improve search results. The target audience of this book is decision makers, business users, and IT architects and specialists who want to understand and analyze their enterprise content to improve and enhance their business operations. …”
Libro electrónico -
8863Publicado 2014“…Wiseman reveals the different modes of the rookie mindset that lead to success: Backpacker: Unencumbered, rookies are more open to new possibilities, ready to explore new terrain, and don't get stuck in yesterday's best practices. Hunter-Gatherer: Rookies seek out experts and return with ideas and resources to address the challenges they face. …”
Libro electrónico -
8864por Amiri, Sarieh“…The first chapter focuses on characterizing nomads and nomadism through examples ranging from the Aka pygmies, hunter-gatherers in the Central African forest, Yakut and Kazakh herders from the Central Asian steppes, or “nomads of contemporary globalization”. …”
Publicado 2021
Electrónico -
8865Publicado 2022“…He then walks you through code examples using Rust, Golang, and JavaScript to demonstrate how they can be compiled to Wasm and consumed from Wasm runtimes deployed standalone, as well as on the cloud. …”
Libro electrónico -
8866por Maurer, Paul J.“…Perfect for security leaders, operations center analysts, incident responders, threat hunters, forensics personnel, and penetration testers, The Code of Honor is an up-to-date and engaging read about the ethically challenging world of modern cybersecurity that will earn a place in the libraries of aspiring and practicing professionals and leaders who deal with tech every day…”
Publicado 2024
Libro electrónico -
8867Publicado 2003“…After introducing the CLI, its core concepts, and the Shared Source CLI implementation, Shared Source CLI Essentials covers these topics: The CLI type system Component packaging and assemblies Type loading and JIT Compilation Managed code and the execution engine Garbage collection and memory management The Platform Adaptation Layer (PAL): a portability layer for Win32®, Mac OS® X, and FreeBSD Written by members of the core Microsoft® team that designed the .NET Framework, Shared Source CLI Essentials is for anyone who wants a deeper understanding of what goes on under the hood of the .NET runtime and the ECMA CLI. Advanced .NET programmers, researchers, the academic community, and CLI implementers who have asked hard questions about the .NET Framework will find that this behind-the-scenes look at the .NET nucleus provides them with excellent resources from which they can extract answers…”
Libro electrónico -
8868Publicado 2003“…The book begins by laying out the Mac OS X tool set, from the included Java Runtime Environment to third-party tools IDEs and Jakarta Ant. …”
Libro electrónico -
8869Publicado 2002“…Topics covered include: Visual Basic language elements Visual Basic's object-oriented language features Programming with attributes The Common Language Runtime Garbage Collection and the Finalize and Dispose methods Programmatically reading from and writing to .NET configuration files Developing Multiple Document Interface (MDI) Windows Forms applications. …”
Libro electrónico -
8870Publicado 2008“…The Microsoft .NET Micro Framework is a small and efficient .NET runtime environment used to run managed code on devices that are too small and resource constrained for Windows CE and the Compact Framework. …”
Libro electrónico -
8871Publicado 2011“…Coverage includes Understanding OpenCL’s architecture, concepts, terminology, goals, and rationale Programming with OpenCL C and the runtime API Using buffers, sub-buffers, images, samplers, and events Sharing and synchronizing data with OpenGL and Microsoft’s Direct3D Simplifying development with the C++ Wrapper API Using OpenCL Embedded Profiles to support devices ranging from cellphones to supercomputer nodes Case studies dealing with physics simulation; image and signal processing, such as image histograms, edge detection filters, Fast Fourier Transforms, and optical flow; math libraries, such as matrix multiplication and high-performance sparse matrix multiplication; and more Source code for this book is available at https://code.google.com/p/opencl-book-samples…”
Libro electrónico -
8872Publicado 2018“…Apache Kafka Connect is a common framework for Apache Kafka producers and consumers.Apache Kafka Connect offers an API, runtime, and REST service to enable developers to define connectors that move large data sets into and out of Apache Kafka in real time. …”
-
8873por Kumar, Vinodh. author“…Focusing specifically on how the Windows 8 app developer can work with the Windows Runtime (often called Windows RT) framework this book provides careful analysis of the many options you have open to you, along with a comparison of their strengths and weaknesses under different conditions. …”
Publicado 2013
Libro electrónico -
8874Publicado 2025“…Whether you're a pentester, a bug bounty hunter, or a student entering the cybersecurity field, Black Hat Bash will teach you how to automate, customize, and optimize your offensive security strategies quickly and efficiently, with no true sorcery required…”
Libro electrónico -
8875Publicado 2008“…This book focuses on the C# 2 and 3 versions of the language, but clearly explains where features are supported by changes in the runtime (CLR) or use new framework classes. Each feature gets a thorough explanation, along with a look on how you'd use it in real life applications. …”
Libro electrónico -
8876por Shulman, Julius“…Volviendo al libro, además de las valiosas imágenes, la publicación ofrece una biografía del autor, una introducción del crítico Owen Edwards y también incluye muchos comentarios del fotógrafo, fruto de varias entrevistas realizadas por el crítico de arte Hunter Drohojowska-Philp…”
Publicado 2007
Libro -
8877Publicado 2022“…Starting with an introduction to memory forensics, this book will gradually take you through more modern concepts of hunting and investigating advanced malware using free tools and memory analysis frameworks. …”
Libro electrónico -
8878Publicado 2020Tabla de Contenidos: “…Chapter 12: Malware Analysis for Incident Response ; Chapter 13: Leveraging Threat Intelligence ; Chapter 14: Hunting for Threats…”
Libro electrónico -
8879Publicado 2014“…Now, Mike Moran and Bill Hunt have completely rewritten their best-seller to present valuable new strategies, best practices, and lessons from experience. …”
Libro electrónico -
8880Publicado 2024Tabla de Contenidos: “…Non-volatile data collection -- Memory collection -- Network traffic collection -- Scaling forensic evidence collection -- Summary -- Part 3: Incident Analysis and Threat Hunting on Windows Systems -- Chapter 5: Gaining Access to the Network -- Exploiting public-facing applications -- External remote services -- Spear phishing attacks -- Drive-by compromise -- Other initial access techniques -- Summary -- Chapter 6: Establishing a Foothold -- Methods of post-exploitation -- Maintaining persistent access on Windows systems -- Event logs -- Windows registry -- Filesystem metafiles -- Other sources…”
Libro electrónico