Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 1,168
- Engineering & Applied Sciences 1,077
- Application software 1,005
- Control 955
- Management 817
- Computer networks 801
- Control de calidad 772
- Computer Science 715
- History 702
- Security measures 662
- Historia 613
- Computer security 592
- Control de natalidad 588
- Electrónica 587
- Programming 532
- TFC 500
- Control de qualitat 483
- Automática y control 466
- Data processing 456
- Computer programs 426
- Operating systems (Computers) 422
- Computer software 406
- Quality control 402
- Web site development 393
- Design 386
- Cloud computing 369
- Photography 347
- Web sites 347
- Control ambiental 330
- Digital techniques 325
-
43221Publicado 2017Tabla de Contenidos: “…Cover -- Title Page -- Copyright -- Acknowledgments -- About the Authors -- About the Technical Editors -- Contents at a Glance -- Contents -- Introduction -- Assessment Test -- Answers to Assessment Test -- Chapter 1 Architectural Concepts -- Business Requirements -- Existing State -- Quantifying Benefits and Opportunity Cost -- Intended Impact -- Cloud Evolution, Vernacular, and Definitions -- New Technology, New Options -- Cloud Computing Service Models -- Cloud Deployment Models -- Cloud Computing Roles and Responsibilities -- Cloud Computing Definitions -- Foundational Concepts of Cloud Computing -- Sensitive Data -- Virtualization -- Encryption -- Auditing and Compliance -- Cloud Service Provider Contracts -- Summary -- Exam Essentials -- Written Labs -- Review Questions -- Chapter 2 Design Requirements -- Business Requirements Analysis -- Inventory of Assets -- Valuation of Assets -- Determination of Criticality -- Risk Appetite -- Boundaries of Cloud Models -- IaaS Boundaries -- PaaS Boundaries -- SaaS Boundaries -- Design Principles for Protecting Sensitive Data -- Hardening Devices -- Encryption -- Layered Defenses -- Summary -- Exam Essentials -- Written Labs -- Review Questions -- Chapter 3 Data Classification -- Data Inventory and Discovery -- Data Ownership -- The Data Life Cycle -- Data Discovery Methods -- Jurisdictional Requirements -- Data Rights Management -- Intellectual Property Protections -- DRM Tool Traits -- Data Control -- Data Retention -- Data Audit -- Data Destruction/Disposal -- Summary -- Exam Essentials -- Written Labs -- Review Questions -- Chapter 4 Cloud Data Security -- Cloud Data Life Cycle -- Create -- Store -- Use -- Share -- Archive -- Destroy -- Cloud Storage Architectures -- Volume Storage: File-Based Storage and Block Storage -- Object-Based Storage -- Databases -- Content Delivery Network (CDN)…”
Libro electrónico -
43222Publicado 2018Tabla de Contenidos: “…. -- Chapter 6: Creating Forms with Redux Form -- Introduction -- Creating a controlled form with the local state -- Getting ready -- How to do it... -- How it works... -- Building a form using Redux Form -- Getting ready -- How to do it... -- How it works... -- Implementing validation in a form -- How to do it... -- How it works... -- Chapter 7: Animations with React -- Introduction -- Animating a todo list with ReactCSSTransitionGroup -- Getting Ready -- How to do it... -- How it works... -- Using react-animations library -- Getting ready -- How to do it... -- There's more... -- Creating our first animation with React Pose -- Getting ready -- How to do it... -- How it works... -- There's more... -- Chapter 8: Creating an API with Node.js Using MongoDB and MySQL -- Introduction -- Creating a basic API with Express -- Getting ready -- How to do it…”
Libro electrónico -
43223Publicado 2017Tabla de Contenidos: “…-- Uninformed versus Informed search -- Constraint Satisfaction Problems -- Local search techniques -- Simulated Annealing -- Constructing a string using greedy search -- Solving a problem with constraints -- Solving the region-coloring problem -- Building an 8-puzzle solver -- Building a maze solver -- Summary -- Chapter 8: Genetic Algorithms -- Understanding evolutionary and genetic algorithms -- Fundamental concepts in genetic algorithms -- Generating a bit pattern with predefined parameters -- Visualizing the evolution -- Solving the symbol regression problem -- Building an intelligent robot controller -- Summary -- Chapter 9: Building Games With Artificial Intelligence…”
Libro electrónico -
43224Publicado 2023Tabla de Contenidos: “…-- Importance of standardizing deliverables -- The art and science of designing insightful standardized reports -- Delving into parts that can be flexible but not compromised -- Mastering the research readout -- Tone and eye contact -- Summary -- Chapter 16: Data Visualization - the Power of Visuals to Help with Cognition and Decisions -- Data visualization for quick insights -- Understanding basic data visualization types -- Static versus interactive visualizations -- Static visualizations -- Interactive visualizations -- Understanding levels of detail -- Moving toward predictive and prescriptive analysis -- Predictive analysis -- When you don't have data scientists at your disposal -- Prescriptive analysis -- Summary -- Chapter 17: Heuristics - How We Measure Application Usability -- Getting to know application heuristics -- Exploring the Nielsen Norman Usability Heuristics Platform -- Visibility of system status -- Match between the system and the real world -- User control and freedom -- Consistency and standards -- Error prevention -- Recognition rather than recall -- Flexibility and efficiency of use -- Aesthetic and minimalist design -- Help users recognize, diagnose, and recover from errors -- Help and documentation -- Making use of other types of evaluation -- Cognitive walk-through -- Feature inspection -- Pluralistic walk-through -- Cognitive dimensions framework -- Wrapping up -- Summary -- In conclusion and thanks -- Index -- Other Books You May Enjoy…”
Libro electrónico -
43225Publicado 2007Tabla de Contenidos: “…Chapter 6: Service Contracts (Standardization and Design) -- 6.1 Contracts Explained -- 6.2 Profiling this Principle -- 6.3 Types of Service Contract Standardization -- 6.4 Contracts and Service Design -- 6.5 Risks Associated with Service Contract Design -- 6.6 More About Service Contracts -- 6.7 Case Study Example -- Chapter 7: Service Coupling (Intra-Service and Consumer Dependencies) -- 7.1 Coupling Explained -- 7.2 Profiling this Principle -- 7.3 Service Contract Coupling Types -- 7.4 Service Consumer Coupling Types -- 7.5 Service Loose Coupling and Service Design -- 7.6 Risks Associated with Service Loose Coupling -- 7.7 Case Study Example -- Chapter 8: Service Abstraction (Information Hiding and Meta Abstraction Types) -- 8.1 Abstraction Explained -- 8.2 Profiling this Principle -- 8.3 Types of Meta Abstraction -- 8.4 Measuring Service Abstraction -- 8.5 Service Abstraction and Service Design -- 8.6 Risks Associated with Service Abstraction -- 8.7 Case Study Example -- Chapter 9: Service Reusability (Commercial and Agnostic Design) -- 9.1 Reuse Explained -- 9.2 Profiling this Principle -- 9.3 Measuring Service Reusability and Applying Commercial Design -- 9.4 Service Reuse in SOA -- 9.5 Standardized Service Reuse and Logic Centralization -- 9.6 Service Reusability and Service Design -- 9.7 Risks Associated with Service Reusability and Commercial Design -- 9.8 Case Study Example -- Chapter 10: Service Autonomy (Processing Boundaries and Control) -- 10.1 Autonomy Explained -- 10.2 Profiling this Principle -- 10.3 Types of Service Autonomy -- 10.4 Measuring Service Autonomy -- 10.5 Autonomy and Service Design -- 10.6 Risks Associated with Service Autonomy -- 10.7 Case Study Example -- Chapter 11: Service Statelessness (State Management Deferral and Stateless Design) -- 11.1 State Management Explained -- 11.2 Profiling this Principle…”
Libro electrónico -
43226por Ferreira, LuisTabla de Contenidos: “…Products reference -- Big picture -- DB2 Content Manager -- GPFS -- LoadLeveler -- Tivoli Access Manager -- Tivoli Enterprise Console® -- Tivoli Intelligent Orchestrator -- Tivoli License Manager -- Tivoli Management Framework -- Tivoli Monitoring -- Tivoli NetView -- Tivoli Provisioning Manager -- Tivoli SAN FS -- Tivoli Service Level Advisor -- Tivoli Workload Scheduler -- TotalStorage SAN Volume Controller -- Virtualization Engine -- WebSphere Application Server -- WebSphere Extended Deployment -- WebSphere Information Integrator -- WebSphere MQ -- WebSphere Portal Server -- Related publications -- IBM Redbooks -- Other publications -- Online resources -- How to get IBM Redbooks -- Help from IBM -- Glossary -- Index -- Back cover…”
Publicado 2005
Libro electrónico -
43227por Parker, Michael, 1963-Tabla de Contenidos: “…Uplink Modulation -- 14.13. Power Control -- 14.14. Higher Data Rates -- 14.15. Spectral Efficiency Considerations -- 14.16. …”
Publicado 2010
Libro electrónico -
43228por Heijnk, StefanTabla de Contenidos: “…-- Storytelling I: Wenn Helden reisen -- Storytelling II: Alternativen zur Heldenreise -- Touchpoint-Management -- Komplexität reduzieren -- Kontaktpunkte mit Wow-Effekt -- Dekonstruiert: Die Desktop-Longformseite fürs Branding -- Dekonstruiert: Die Mobilseite für den Verkauf -- Dekonstruiert: Der Content Hub für Branding und Verkauf -- Das Publizieren nach dem Publizieren -- Touchpoints sauber orchestrieren -- Controlling: Hat's funktioniert? -- Epilog -- Index -- Medienwebsites -- Firmenwebsites -- Literaturverzeichnis…”
Publicado 2021
Libro electrónico -
43229Publicado 2020Tabla de Contenidos: “…Ensuring That You Have a Good Hypothesis -- Examples of a good (and a bad) hypothesis -- Surveys and research are precursors to tests -- Seeing How the Pieces Fit Together -- Chapter 8 Prioritizing Your Ideas before You Test Them -- The Importance of Prioritization -- Methodologies for Prioritizing Ideas -- The ICE score -- The PIE framework -- The TIR score -- The RICE score -- General Criticisms of Simpler Frameworks -- Chapter 9 Testing Ideas and Learning from Them -- Working with Two Types of Tests -- Prepping tests -- Testing variants -- Common testing pitfalls and ways to work around them -- Analyzing Results -- Acting on What You've Learned -- Winning tests -- Losing tests -- Inconclusive tests -- Systemizing changes -- Chapter 10 Managing the Growth Process -- Establishing a Weekly Routine -- Setting the Ground Rules -- Moving to a Month-to-Month Schedule -- Reviewing objectives monthly -- Checking on the impact of individual tests -- Taking the Long-Term Perspective -- Chapter 11 Laying the Right Foundation for Company-Wide Growth -- Taking Baby Steps -- Making Your CEO the Growth Advocate -- Sharing Is Better than Hoarding -- Weekly updates -- Monthly deep dives -- Quarterly updates -- Part 4 The Part of Tens -- Chapter 12 Ten Key Benefits of the Growth Hacking Methodology -- A Focus on Process versus Tactics -- Cross-Functional Collaboration -- Organizational Alignment -- Data-Informed Decision-Making -- Improved Customer Focus -- A Better Understanding of Your Customers -- Improved Customer Experience -- A State of Constant Curiosity -- Better Product-Development Processes -- Greater Control because of Product-First Growth -- Chapter 13 Ten Things to Watch Out For -- Ignoring the Need to Constantly Evangelize Progress and Learning -- Not Sticking to the Growth Meeting Agenda -- Testing Things That Don't Need to Be Tested (Right Now)…”
Libro electrónico -
43230Publicado 2010Tabla de Contenidos: “…Inline and Floated List Items -- Using Positioning to Escape Containers -- Overlays, Tooltips, and Drop-Down Menus -- Multicolumn CSS Layouts -- A Two-Column Layout -- Two Columns with Right Sidebar -- A Three-Column Layout -- Fixed-Sized, Flexible, and Mixed Columns -- Designing with Constraints -- Chapter 8: Backgrounds and Borders -- Backgrounds -- Multiple Background Images -- Strategies for Background Images -- Background Image Sprites -- Border -- Outline -- Faking Rounded Corners -- Chapter 9: Typography and Web Fonts -- Font Basics -- font-family -- font-size -- font-weight -- font-variant -- font-style -- line-height -- font (Shorthand) -- vertical-align -- Additional Font Styling -- text-decoration -- text-transform -- word-spacing -- letter-spacing -- text-align -- white-space -- word-wrap -- text-indent -- text-shadow -- Specifying Typefaces -- System Fonts -- Font Embedding -- Custom Fonts via Text Replacement -- Chapter 10: Lists and Tables -- Lists -- display: list-item -- list-style-type -- Generated Content -- Counters -- Tables -- table-layout -- border-collapse -- border-spacing -- empty-cells -- vertical-align -- text-align -- Table display Values -- Chapter 11: Forms and User Interface Elements -- Working with Form Controls -- Sizing -- Colors, Backgrounds, and Borders -- Text and Form Element Inheritance -- States: Disabled, Required, and Invalid -- Common Form Element Layouts -- Label Stacked Above the Field -- Basic Multicolumn Forms -- Label Besides the Field -- Exceptions for Radio Buttons and Check Boxes -- Inputting Tabular Data -- Conditional Fields -- Placeholder Text -- Making Buttons -- Background Images -- CSS3: text-shadow, border-radius, and Gradients -- Links As Buttons -- Chapter 12: Media: Printing and Other Devices -- Media Types -- List of Media Types -- Specifying Media Types -- Print Media…”
Libro electrónico -
43231Publicado 2009Tabla de Contenidos: “…3.6 Classes and Objects -- Classes -- Object Literals -- Using public-init -- Init Blocks -- Using public-read -- Using this -- Using null -- Using Java Objects -- Binding with Object Literals -- Overriding bind -- 3.7 Inheritance -- Overriding Functions -- Using super -- PostInit Blocks -- Abstract Base Classes -- As Operator -- Mixin Inheritance -- 3.8 Triggers -- On Replace with Variables -- On Replace with Sequences -- On Replace with isInitialized -- On Replace with Bind -- 3.9 Script Files and Packages -- Variable Scope -- Function Scope -- Script Files -- Access Modifiers -- Packages -- 3.10 Exception Handling -- Try, Catch, Finally -- Throwing Exceptions -- 3.11 JavaFX Keywords -- Chapter 4 Graphical Objects -- What You Will Learn -- 4.1 Setting the Stage -- Scene -- Node -- Cursor -- Group -- CustomNode -- 4.2 Shapes -- Rectangle -- Circle -- Ellipse -- Arc -- Polygon -- QuadCurve -- CubicCurve -- Line -- Polyline -- SVGPath -- ShapeIntersect/ShapeSubtract -- Text -- 4.3 Paths -- 4.4 Layout Components -- HBox and VBox Layout Components -- Flow and Tile Layout Components -- Stack Layout Component -- 4.5 Geometry -- Point2D -- Bounds/Rectangle2D -- Bounding Rectangles -- Chapter 5 User Interface Components -- What You Will Learn -- 5.1 JavaFX UI Controls -- TextBox -- UI Components -- Popup Windows -- 5.2 Swing Components -- SwingButton -- SwingCheckBox -- SwingComboBox -- SwingComboBoxItem -- SwingIcon -- SwingLabel -- SwingScrollPane -- SwingList -- SwingListItem -- SwingRadioButton -- SwingToggleButton -- SwingToggleGroup -- SwingSlider -- SwingTextField -- 5.3 Swing Example -- Pizzas Are Circles -- Toppings Are Circles -- Selecting Pizza Size with SwingRadioButton -- Selecting Toppings with SwingCheckBox -- Integrating with Bound Functions and Binding -- 5.4 Creating Skinnable Components -- Cascading Style Sheets (CSS)…”
Libro electrónico -
43232Publicado 2004Tabla de Contenidos: “…Planning and security considerations -- 2.1 System requirements -- 2.1.1 Supported operating systems -- 2.1.2 Hardware considerations -- 2.1.3 Disk space -- 2.1.4 System memory -- 2.2 Software resources -- 2.2.1 IBM DB2 Universal Database Enterprise Server Edition -- 2.2.2 IBM WebSphere MQ -- 2.2.3 IBM Agent Controller -- 2.2.4 Supported broker databases -- 2.3 Security issues -- 2.3.1 Security for installation -- 2.3.2 Post-installation security -- 2.3.3 Other security issues -- 2.4 Migration tasks -- 2.4.1 Before installing WebSphere Business Integration Message Brokers -- 2.4.2 After installing WebSphere Business Integration Message Brokers -- 2.5 Post-installation configuration tasks -- Chapter 3. …”
Libro electrónico -
43233Understanding LTE with MATLAB from mathematical foundation to simulation and prototypingUnderstanding LTE with MATLABpor Zarrinkoub, HoumanTabla de Contenidos: “…Preface xiii List of Abbreviations xvii 1 Introduction 1 1.1 Quick Overview of Wireless Standards 1 1.2 Historical Profile of Data Rates 4 1.3 IMT-Advanced Requirements 4 1.4 3GPP and LTE Standardization 5 1.5 LTE Requirements 5 1.6 Theoretical Strategies 6 1.7 LTE-Enabling Technologies 7 1.8 LTE Physical Layer (PHY) Modeling 9 1.9 LTE (Releases 8 and 9) 11 1.10 LTE-Advanced (Release 10) 11 1.11 MATLAB(R) and Wireless System Design 11 1.12 Organization of This Book 11 References 12 2 Overview of the LTE Physical Layer 13 2.1 Air Interface 13 2.2 Frequency Bands 14 2.3 Unicast and Multicast Services 14 2.4 Allocation of Bandwidth 16 2.5 Time Framing 17 2.6 Time Frequency Representation 17 2.7 OFDM Multicarrier Transmission 20 2.8 Single-Carrier Frequency Division Multiplexing 23 2.9 Resource Grid Content 24 2.10 Physical Channels 25 2.11 Physical Signals 31 2.12 Downlink Frame Structures 34 2.13 Uplink Frame Structures 35 2.14 MIMO 35 2.15 MIMO Modes 40 2.16 PHY Processing 41 2.17 Downlink Processing 41 2.18 Uplink Processing 43 2.19 Chapter Summary 45 References 46 3 MATLAB(R) for Communications System Design 47 3.1 System Development Workflow 47 3.2 Challenges and Capabilities 48 3.3 Focus 49 3.4 Approach 49 3.5 PHY Models in MATLAB 49 3.6 MATLAB 49 3.7 MATLAB Toolboxes 50 3.8 Simulink 51 3.9 Modeling and Simulation 52 3.10 Prototyping and Implementation 53 3.11 Introduction to System Objects 54 3.12 MATLAB Channel Coding Examples 60 3.13 Chapter Summary 68 References 69 4 Modulation and Coding 71 4.1 Modulation Schemes of LTE 72 4.2 Bit-Level Scrambling 79 4.3 Channel Coding 85 4.4 Turbo Coding 85 4.5 Early-Termination Mechanism 93 4.6 Rate Matching 99 4.7 Codeblock Segmentation 105 4.8 LTE Transport-Channel Processing 107 4.9 Chapter Summary 112 References 113 5 OFDM 115 5.1 Channel Modeling 115 Examples 117 5.2 Scope 121 5.3 Workflow 121 5.4 OFDM and Multipath Fading 122 5.5 OFDM and Channel-Response Estimation 123 5.6 Frequency-Domain Equalization 124 5.7 LTE Resource Grid 124 5.8 Configuring the Resource Grid 125 5.9 Generating Reference Signals 130 5.10 Resource Element Mapping 132 5.11 OFDM Signal Generation 136 5.12 Channel Modeling 137 5.13 OFDM Receiver 140 5.14 Resource Element Demapping 141 5.15 Channel Estimation 143 5.16 Equalizer Gain Computation 145 5.17 Visualizing the Channel 146 5.18 Downlink Transmission Mode 1 147 5.19 Chapter Summary 164 References 165 6 MIMO 167 6.1 Definition of MIMO 167 6.2 Motivation for MIMO 168 6.3 Types of MIMO 168 6.4 Scope of MIMO Coverage 170 6.5 MIMO Channels 170 Implementation 171 6.6 Common MIMO Features 178 6.7 Specific MIMO Features 197 6.8 Chapter Summary 260 References 262 7 Link Adaptation 263 7.1 System Model 264 7.2 Link Adaptation in LTE 265 7.3 MATLAB(R) Examples 266 7.4 Link Adaptations between Subframes 275 7.5 Adaptive Modulation 277 7.6 Adaptive Modulation and Coding Rate 283 7.7 Adaptive Precoding 287 7.8 Adaptive MIMO 291 7.9 Downlink Control Information 294 7.10 Chapter Summary 302 References 303 8 System-Level Specification 305 8.1 System Model 306 8.2 System Model in MATLAB 315 8.3 Quantitative Assessments 316 8.4 Throughput Analysis 325 8.5 System Model in Simulink 326 8.6 Qualitative Assessment 349 8.7 Chapter Summary 351 References 352 9 Simulation 353 9.1 Speeding Up Simulations in MATLAB 353 9.2 Workflow 354 9.3 Case Study: LTE PDCCH Processing 355 9.4 Baseline Algorithm 356 9.5 MATLAB Code Profiling 358 9.6 MATLAB Code Optimizations 360 9.7 Using Acceleration Features 383 9.8 Using a Simulink Model 387 9.9 GPU Processing 399 9.10 Case Study: Turbo Coders on GPU 406 9.11 Chapter Summary 419 10 Prototyping as C/C++ Code 421 10.1 Use Cases 422 10.2 Motivations 422 10.3 Requirements 422 10.4 MATLAB Code Considerations 423 10.5 How to Generate Code 423 10.6 Structure of the Generated C Code 429 10.7 Supported MATLAB Subset 432 10.8 Complex Numbers and Native C Types 436 10.9 Support for System Toolboxes 438 10.10 Support for Fixed-Point Data 444 10.11 Support for Variable-Sized Data 447 10.12 Integration with Existing C/C++ Code 458 10.13 Chapter Summary 471 References 471 11 Summary 473 11.1 Modeling 473 11.2 Simulation 476 11.3 Directions for Future Work 477 11.4 Concluding Remarks 480 Index 483.…”
Publicado 2014
Libro electrónico -
43234Publicado 2023Tabla de Contenidos: “…Voluntary and Open Membership -- 2. Democratic Member Control -- 3. Member Economic Participation -- 4. …”
Libro electrónico -
43235Publicado 2020Tabla de Contenidos: “…Hacia una perspectiva sistémica / Miguel Ángel Moreno Alcázar -- La estructura típica del artículo 325 del Código Penal / Fernando Navarro Cardoso -- El principio de accesoriedad administrativa en los delitos de maltrato animal / Eduardo Olmedo de la Calle -- Divagaciones sobre incivismo y Derecho penal / Enrique Orts Berenguer -- Puertos francos: zonas de impunidad en la protección de bienes culturales / Juan José Periago Morant -- Una aproximación a los límites penales del humor (si es que los tiene) / José Antonio Ramos Vázquez -- El declive de la libertad de expresión: propuesta de penalizar un discurso político / Margarita Roig Torres -- La discutida cláusula concursal del artículo 183 ter. 1o CP: aproximación desde la jurisprudencia del Tribunal Supremo / María Sánchez Vilanova -- El control del terror speech en la red. El papel de las empresas proveedoras de servicios de internet / Rosario Serra Cristóbal -- Empresas prevaricadoras. …”
Libro electrónico -
43236Publicado 2024Tabla de Contenidos: “…-- Summary -- Part 4: DataOps -- Chapter 9: Data Quality and Observability -- Understanding the problem of data quality at the source, in transformations, and in data governance -- Data quality issues in source systems -- Data quality issues in data infrastructure and data pipelines -- How data governance impacts data quality -- Finding solutions to data quality issues - observability, data catalogs, and semantic layers -- Using observability to improve your data quality -- The benefits of data catalogs for data quality -- Improving data quality with a semantic layer -- Summary -- Chapter 10: Writing Code in a Team -- Identifying the responsibilities of team members -- Tracking tasks and issues -- Tools for issue and task tracking -- Clear task definition -- Categorization and tagging -- Managing versions with version control -- Working with Git -- Git branching -- Development workflow for analytics engineers -- Working with coding standards -- PEP8 -- ANSI -- Linters -- Pre-commit hooks -- Reviewing code -- Pull requests - The four eyes principle -- Continuous integration/continuous deployment -- Documenting code -- Documenting code in dbt -- Code comments -- READMEs -- Documentation on getting started…”
Libro electrónico -
43237Publicado 2015Tabla de Contenidos: “…Chapter 1 Introductory Concepts -- 1-1 Digital and Analog Quantities -- 1-2 Binary Digits, Logic Levels, and Digital Waveforms -- 1-3 Basic Logic Functions -- 1-4 Combinational and Sequential Logic Functions -- 1-5 Introduction to Programmable Logic -- 1-6 Fixed-Function Logic Devices -- 1-7 Test and Measurement Instruments -- 1-8 Introduction to Troubleshooting -- Chapter 2 Number Systems, Operations, and Codes -- 2-1 Decimal Numbers -- 2-2 Binary Numbers -- 2-3 Decimal-to-Binary Conversion -- 2-4 Binary Arithmetic -- 2-5 Complements of Binary Numbers -- 2-6 Signed Numbers -- 2-7 Arithmetic Operations with Signed Numbers -- 2-8 Hexadecimal Numbers -- 2-9 Octal Numbers -- 2-10 Binary Coded Decimal (BCD) -- 2-11 Digital Codes -- 2-12 Error Codes -- Chapter 3 Logic Gates -- 3-1 The Inverter -- 3-2 The AND Gate -- 3-3 The OR Gate -- 3-4 The NAND Gate -- 3-5 The NOR Gate -- 3-6 The Exclusive-OR and Exclusive-NOR Gates -- 3-7 Programmable Logic -- 3-8 Fixed-Function Logic Gates -- 3-9 Troubleshooting -- Chapter 4 Boolean Algebra and Logic Simplification -- 4-1 Boolean Operations and Expressions -- 4-2 Laws and Rules of Boolean Algebra -- 4-3 DeMorgan's Theorems -- 4-4 Boolean Analysis of Logic Circuits -- 4-5 Logic Simplification Using Boolean Algebra -- 4-6 Standard Forms of Boolean Expressions -- 4-7 Boolean Expressions and Truth Tables -- 4-8 The Karnaugh Map -- 4-9 Karnaugh Map SOP Minimization -- 4-10 Karnaugh Map POS Minimization -- 4-11 The Quine-McCluskey Method -- 4-12 Boolean Expressions with VHDL -- Applied Logic -- Chapter 5 Combinational Logic Analysis -- 5-1 Basic Combinational Logic Circuits -- 5-2 Implementing Combinational Logic -- 5-3 The Universal Property of NAND and NOR Gates -- 5-4 Combinational Logic Using NAND and NOR Gates -- 5-5 Pulse Waveform Operation -- 5-6 Combinational Logic with VHDL -- 5-7 Troubleshooting -- Applied Logic -- Chapter 6 Functions of Combinational Logic -- 6-1 Half and Full Adders -- 6-2 Parallel Binary Adders -- 6-3 Ripple Carry and Look-Ahead Carry Adders -- 6-4 Comparators -- 6-5 Decoders -- 6-6 Encoders -- 6-7 Code Converters -- 6-8 Multiplexers (Data Selectors) -- 6-9 Demultiplexers -- 6-10 Parity Generators/Checkers -- 6-11 Troubleshooting -- Applied Logic -- Chapter 7 Latches, Flip-Flops, and Timers -- 7-1 Latches -- 7-2 Flip-Flops -- 7-3 Flip-Flop Operating Characteristics -- 7-4 Flip-Flop Applications -- 7-5 One-Shots -- 7-6 The Astable Multivibrator -- 7-7 Troubleshooting -- Applied Logic -- Chapter 8 Shift Registers -- 8-1 Shift Register Operations -- 8-2 Types of Shift Register Data I/Os -- 8-3 Bidirectional Shift Registers -- 8-4 Shift Register Counters -- 8-5 Shift Register Applications -- 8-6 Logic Symbols with Dependency Notation -- 8-7 Troubleshooting -- Applied Logic -- Chapter 9 Counters -- 9-1 Finite State Machines -- 9-2 Asynchronous Counters -- 9-3 Synchronous Counters -- 9-4 Up/Down Synchronous Counters -- 9-5 Design of Synchronous Counters -- 9-6 Cascaded Counters -- 9-7 Counter Decoding -- 9-8 Counter Applications -- 9-9 Logic Symbols with Dependency Notation -- 9-10 Troubleshooting -- Applied Logic -- Chapter 10 Programmable Logic -- 10-1 Simple Programmable Logic Devices (SPLDs) -- 10-2 Complex Programmable Logic Devices (CPLDs) -- 10-3 Macrocell Modes -- 10-4 Field-Programmable Gate Arrays (FPGAs) -- 10-5 Programmable Logic Software -- 10-6 Boundary Scan Logic -- 10-7 Troubleshooting -- Applied Logic -- Chapter 11 Data Storage -- 11-1 Semiconductor Memory Basics -- 11-2 The Random-Access Memory (RAM) -- 11-3 The Read-Only Memory (ROM) -- 11-4 Programmable ROMs -- 11-5 The Flash Memory -- 11-6 Memory Expansion -- 11-7 Special Types of Memories -- 11-8 Magnetic and Optical Storage -- 11-9 Memory Hierarchy -- 11-10 Cloud Storage -- 11-11 Troubleshooting -- Chapter 12 Signal Conversion and Processing -- 12-1 Analog-to-Digital Conversion -- 12-2 Methods of Analog-to-Digital Conversion -- 12-3 Methods of Digital-to-Analog Conversion -- 12-4 Digital Signal Processing -- 12-5 The Digital Signal Processor (DSP) -- Chapter 13 Data transmission -- 13-1 Data Transmission Media -- 13-2 Methods and Modes of Data Transmission -- 13-3 Modulation of Analog Signals with Digital Data -- 13-4 Modulation of Digital Signals with Analog Data -- 13-5 Multiplexing and Demultiplexing -- 13-6 Bus Basics -- 13-7 Parallel Buses -- 13-8 The Universal Serial Bus (USB) -- 13-9 Other Serial Buses -- 13-10 Bus Interfacing -- Chapter 14 Data Processing and Control -- 14-1 The Computer System -- 14-2 Practical Computer System Considerations -- 14-3 The Processor: Basic Operation -- 14-4 The Processor: Addressing Modes -- 14-5 The Processor: Special Operations -- 14-6 Operating Systems and Hardware -- 14-7 Programming -- 14-8 Microcontrollers and Embedded Systems -- 14-9 System on Chip (SoC) -- Chapter 15 Integrated Circuit Technologies -- 15-1 Basic Operational Characteristics and Parameters -- 15-2 CMOS Circuits -- 15-3 TTL (Bipolar) Circuits -- 15-4 Practical Considerations in the Use of TTL -- 15-5 Comparison of CMOS and TTL Performance -- 15-6 Emitter-Coupled Logic (ECL) Circuits -- 15-7 PMOS, NMOS, and E2CMOS…”
Libro electrónico -
43238Publicado 2023Tabla de Contenidos: “…-- POWER systems -- IBM iSeries -- OS/400 overview -- Applications -- Data -- Control Language -- ISV versus homegrown solutions…”
Libro electrónico -
43239Publicado 2024Tabla de Contenidos: “…A simple example -- Impersonate -- Password stealing -- Practical example -- Leveraging DLL search order hijacking and supply chain attacks -- Practical example -- Circumventing UAC -- fodhelper.exe -- Practical example -- Summary -- Part 2: Evasion Techniques -- Chapter 5: Anti-Debugging Tricks -- Technical requirements -- Detecting debugger presence -- Practical example 1 -- Practical example 2 -- Spotting breakpoints -- Practical example -- Identifying flags and artifacts -- Practical example -- ProcessDebugFlags -- Practical example -- Summary -- Chapter 6: Navigating Anti-Virtual Machine Strategies -- Technical requirements -- Filesystem detection techniques -- VirtualBox machine detection -- A practical example -- Demo -- Approaches to hardware detection -- Checking the HDD -- Demo -- Time-based sandbox evasion techniques -- A simple example -- Identifying VMs through the registry -- A practical example -- Demo -- Summary -- Chapter 7: Strategies for Anti-Disassembly -- Popular anti-disassembly techniques -- Practical example -- Exploring the function control problem and its benefits -- Practical example -- Obfuscation of the API and assembly code -- Practical example -- Crashing malware analysis tools -- Practical example -- Summary -- Chapter 8: Navigating the Antivirus Labyrinth - a Game of Cat and Mouse -- Technical requirements -- Understanding the mechanics of antivirus engines -- Static detection -- Heuristic detection -- Dynamic heuristic analysis -- Behavior analysis -- Evasion static detection -- Practical example -- Evasion dynamic analysis -- Practical example -- Circumventing the Antimalware Scan Interface (AMSI) -- Practical example -- Advanced evasion techniques -- Syscalls -- Syscall ID -- Practical example -- Userland hooking -- Direct syscalls -- Practical example -- Bypassing EDR -- Practical example -- Summary…”
Libro electrónico -
43240Publicado 2024Tabla de Contenidos: “…Creating a class that has orderable objects -- Deleting from a list of complicated objects -- Chapter 9: Functional Programming Features -- Writing generator functions with the yield statement -- Applying transformations to a collection -- Using stacked generator expressions -- Picking a subset - three ways to filter -- Summarizing a collection - how to reduce -- Combining the map and reduce transformations -- Implementing ``there exists'' processing -- Creating a partial function -- Writing recursive generator functions with the yield from statement -- Chapter 10: Working with Type Matching and Annotations -- Designing with type hints -- Using the built-in type matching functions -- Using the match statement -- Handling type conversions -- Implementing more strict type checks with Pydantic -- Including run-time valid value checks -- Chapter 11: Input/Output, Physical Format, and Logical Layout -- Using pathlib to work with filenames -- Replacing a file while preserving the previous version -- Reading delimited files with the CSV module -- Using dataclasses to simplify working with CSV files -- Reading complex formats using regular expressions -- Reading JSON and YAML documents -- Reading XML documents -- Reading HTML documents -- Chapter 12: Graphics and Visualization with Jupyter Lab -- Starting a Notebook and creating cells with Python code -- Ingesting data into a notebook -- Using pyplot to create a scatter plot -- Using axes directly to create a scatter plot -- Adding details to markdown cells -- Including Unit Test Cases in a Notebook -- Chapter 13: Application Integration: Configuration -- Finding configuration files -- Using TOML for configuration files -- Using Python for configuration files -- Using a class as a namespace for configuration -- Designing scripts for composition -- Using logging for control and audit output…”
Libro electrónico