Mostrando 8,861 - 8,880 Resultados de 9,969 Para Buscar 'Huntik~', tiempo de consulta: 1.20s Limitar resultados
  1. 8861
    Publicado 2012
    “…A .NET assembly can be called from within a message flow and the WebSphere Message Broker runtime can host and run .NET code. Solutions explored in this book cover connectivity to applications using Windows Communications Framework (WCF), Microsoft Message Queuing, Microsoft Dynamics CRM, and other Microsoft applications. …”
    Libro electrónico
  2. 8862
    Publicado 2014
    “…In addition, the book describes how to use the enterprise search capability for the discovery and retrieval of documents using various query and visual navigation techniques, and customization of crawling, parsing, indexing, and runtime search to improve search results. The target audience of this book is decision makers, business users, and IT architects and specialists who want to understand and analyze their enterprise content to improve and enhance their business operations. …”
    Libro electrónico
  3. 8863
    Publicado 2014
    “…Wiseman reveals the different modes of the rookie mindset that lead to success: Backpacker: Unencumbered, rookies are more open to new possibilities, ready to explore new terrain, and don't get stuck in yesterday's best practices. Hunter-Gatherer: Rookies seek out experts and return with ideas and resources to address the challenges they face. …”
    Libro electrónico
  4. 8864
    por Amiri, Sarieh
    Publicado 2021
    “…The first chapter focuses on characterizing nomads and nomadism through examples ranging from the Aka pygmies, hunter-gatherers in the Central African forest, Yakut and Kazakh herders from the Central Asian steppes, or “nomads of contemporary globalization”. …”
    Electrónico
  5. 8865
    Publicado 2022
    “…He then walks you through code examples using Rust, Golang, and JavaScript to demonstrate how they can be compiled to Wasm and consumed from Wasm runtimes deployed standalone, as well as on the cloud. …”
    Libro electrónico
  6. 8866
    por Maurer, Paul J.
    Publicado 2024
    “…Perfect for security leaders, operations center analysts, incident responders, threat hunters, forensics personnel, and penetration testers, The Code of Honor is an up-to-date and engaging read about the ethically challenging world of modern cybersecurity that will earn a place in the libraries of aspiring and practicing professionals and leaders who deal with tech every day…”
    Libro electrónico
  7. 8867
    Publicado 2003
    “…After introducing the CLI, its core concepts, and the Shared Source CLI implementation, Shared Source CLI Essentials covers these topics: The CLI type system Component packaging and assemblies Type loading and JIT Compilation Managed code and the execution engine Garbage collection and memory management The Platform Adaptation Layer (PAL): a portability layer for Win32®, Mac OS® X, and FreeBSD Written by members of the core Microsoft® team that designed the .NET Framework, Shared Source CLI Essentials is for anyone who wants a deeper understanding of what goes on under the hood of the .NET runtime and the ECMA CLI. Advanced .NET programmers, researchers, the academic community, and CLI implementers who have asked hard questions about the .NET Framework will find that this behind-the-scenes look at the .NET nucleus provides them with excellent resources from which they can extract answers…”
    Libro electrónico
  8. 8868
    Publicado 2003
    “…The book begins by laying out the Mac OS X tool set, from the included Java Runtime Environment to third-party tools IDEs and Jakarta Ant. …”
    Libro electrónico
  9. 8869
    Publicado 2002
    “…Topics covered include: Visual Basic language elements Visual Basic's object-oriented language features Programming with attributes The Common Language Runtime Garbage Collection and the Finalize and Dispose methods Programmatically reading from and writing to .NET configuration files Developing Multiple Document Interface (MDI) Windows Forms applications. …”
    Libro electrónico
  10. 8870
    Publicado 2008
    “…The Microsoft .NET Micro Framework is a small and efficient .NET runtime environment used to run managed code on devices that are too small and resource constrained for Windows CE and the Compact Framework. …”
    Libro electrónico
  11. 8871
    Publicado 2011
    “…Coverage includes Understanding OpenCL’s architecture, concepts, terminology, goals, and rationale Programming with OpenCL C and the runtime API Using buffers, sub-buffers, images, samplers, and events Sharing and synchronizing data with OpenGL and Microsoft’s Direct3D Simplifying development with the C++ Wrapper API Using OpenCL Embedded Profiles to support devices ranging from cellphones to supercomputer nodes Case studies dealing with physics simulation; image and signal processing, such as image histograms, edge detection filters, Fast Fourier Transforms, and optical flow; math libraries, such as matrix multiplication and high-performance sparse matrix multiplication; and more Source code for this book is available at https://code.google.com/p/opencl-book-samples…”
    Libro electrónico
  12. 8872
    Publicado 2018
    “…Apache Kafka Connect is a common framework for Apache Kafka producers and consumers.Apache Kafka Connect offers an API, runtime, and REST service to enable developers to define connectors that move large data sets into and out of Apache Kafka in real time. …”
    Video
  13. 8873
    por Kumar, Vinodh. author
    Publicado 2013
    “…Focusing specifically on how the Windows 8 app developer can work with the Windows Runtime (often called Windows RT) framework this book provides careful analysis of the many options you have open to you, along with a comparison of their strengths and weaknesses under different conditions. …”
    Libro electrónico
  14. 8874
    Publicado 2025
    “…Whether you're a pentester, a bug bounty hunter, or a student entering the cybersecurity field, Black Hat Bash will teach you how to automate, customize, and optimize your offensive security strategies quickly and efficiently, with no true sorcery required…”
    Libro electrónico
  15. 8875
    Publicado 2008
    “…This book focuses on the C# 2 and 3 versions of the language, but clearly explains where features are supported by changes in the runtime (CLR) or use new framework classes. Each feature gets a thorough explanation, along with a look on how you'd use it in real life applications. …”
    Libro electrónico
  16. 8876
    por Shulman, Julius
    Publicado 2007
    “…Volviendo al libro, además de las valiosas imágenes, la publicación ofrece una biografía del autor, una introducción del crítico Owen Edwards y también incluye muchos comentarios del fotógrafo, fruto de varias entrevistas realizadas por el crítico de arte Hunter Drohojowska-Philp…”
    Libro
  17. 8877
    Publicado 2022
    “…Starting with an introduction to memory forensics, this book will gradually take you through more modern concepts of hunting and investigating advanced malware using free tools and memory analysis frameworks. …”
    Libro electrónico
  18. 8878
    Publicado 2020
    Tabla de Contenidos: “…Chapter 12: Malware Analysis for Incident Response ; Chapter 13: Leveraging Threat Intelligence ; Chapter 14: Hunting for Threats…”
    Libro electrónico
  19. 8879
    Publicado 2014
    “…Now, Mike Moran and Bill Hunt have completely rewritten their best-seller to present valuable new strategies, best practices, and lessons from experience. …”
    Libro electrónico
  20. 8880
    Publicado 2024
    Tabla de Contenidos: “…Non-volatile data collection -- Memory collection -- Network traffic collection -- Scaling forensic evidence collection -- Summary -- Part 3: Incident Analysis and Threat Hunting on Windows Systems -- Chapter 5: Gaining Access to the Network -- Exploiting public-facing applications -- External remote services -- Spear phishing attacks -- Drive-by compromise -- Other initial access techniques -- Summary -- Chapter 6: Establishing a Foothold -- Methods of post-exploitation -- Maintaining persistent access on Windows systems -- Event logs -- Windows registry -- Filesystem metafiles -- Other sources…”
    Libro electrónico