Mostrando 1,141 - 1,160 Resultados de 1,253 Para Buscar 'Real Mamoré~', tiempo de consulta: 1.50s Limitar resultados
  1. 1141
    Publicado 2018
    “…It also teaches you techniques to investigate and hunt malware using memory forensics. This book introduces you to the basics of malware analysis, and then gradually progresses into the more advanced concepts of code analysis and memory forensics. …”
    Libro electrónico
  2. 1142
    Publicado 2019
    “…Compare 15-year vs. 30-year mortgage terms, choose between leasing or buying a car, compute classroom grades, create an amortization table, evaluate investment performance, calculate the real cost of credit card purchases, or forecast college expenses and savings. …”
    Libro electrónico
  3. 1143
    Publicado 2024
    “…With a focus on real-world applications, you'll learn how to secure systems, implement effective logging, and deploy applications seamlessly. …”
    Libro electrónico
  4. 1144
    por Russinovich, Mark E.
    Publicado 2009
    Tabla de Contenidos: “…Partition Manager -- Volume Management -- Basic Disks -- Dynamic Disks -- Multipartition Volume Management -- The Volume Namespace -- Volume I/O Operations -- Virtual Disk Service -- BitLocker Drive Encryption -- BitLocker Architecture -- Encryption Keys -- Trusted Platform Module (TPM) -- BitLocker Boot Process -- BitLocker Key Recovery -- Full Volume Encryption Driver -- BitLocker Management -- Volume Shadow Copy Service -- Shadow Copies -- VSS Architecture -- VSS Operation -- Uses in Windows -- Conclusion -- Memory Management -- Introduction to the Memory Manager -- Memory Manager Components -- Internal Synchronization -- Examining Memory Usage -- Services the Memory Manager Provides -- Large and Small Pages -- Reserving and Committing Pages -- Locking Memory -- Allocation Granularity -- Shared Memory and Mapped Files -- Protecting Memory -- No Execute Page Protection -- Copy-on-Write -- Address Windowing Extensions -- Kernel-Mode Heaps (System Memory Pools) -- Pool Sizes -- Monitoring Pool Usage -- Look-Aside Lists -- Heap Manager -- Types of Heaps -- Heap Manager Structure -- Heap Synchronization -- The Low Fragmentation Heap -- Heap Security Features -- Heap Debugging Features -- Pageheap -- Virtual Address Space Layouts -- x86 Address Space Layouts -- x86 System Address Space Layout -- x86 Session Space -- System Page Table Entries -- 64-Bit Address Space Layouts -- 64-Bit Virtual Addressing Limitations -- Dynamic System Virtual Address Space Management -- System Virtual Address Space Quotas -- User Address Space Layout -- Address Translation -- x86 Virtual Address Translation -- Translation Look-Aside Buffer -- Physical Address Extension (PAE) -- IA64 Virtual Address Translation -- x64 Virtual Address Translation -- Page Fault Handling -- Invalid PTEs -- Prototype PTEs -- In-Paging I/O -- Collided Page Faults -- Clustered Page Faults…”
    Libro electrónico
  5. 1145
    Publicado 1998
    Tabla de Contenidos: “…Flushing pending output -- The Underlying Data Structure -- Asynchronous Notification -- The Driver's Point of View -- Seeking a Device -- The llseek Implementation -- Access Control on a Device File -- Single-Open Devices -- Restricting Access to a Single User at a Time -- Blocking open as an Alternative to EBUSY -- Cloning the Device on open -- Quick Reference -- Time, Delays, and Deferred Work -- Measuring Time Lapses -- Using the jiffies Counter -- Processor-Specific Registers -- Knowing the Current Time -- Delaying Execution -- Long Delays -- Busy waiting -- Yielding the processor -- Timeouts -- Short Delays -- Kernel Timers -- The Timer API -- The Implementation of Kernel Timers -- Tasklets -- Workqueues -- The Shared Queue -- Quick Reference -- Timekeeping -- Delays -- Kernel Timers -- Tasklets -- Workqueues -- Allocating Memory -- The Real Story of kmalloc -- The Flags Argument -- Memory zones -- The Size Argument -- Lookaside Caches -- A scull Based on the Slab Caches: scullc -- Memory Pools -- get_free_page and Friends -- A scull Using Whole Pages: scullp -- The alloc_pages Interface -- vmalloc and Friends -- A scull Using Virtual Addresses: scullv -- Per-CPU Variables -- Obtaining Large Buffers -- Acquiring a Dedicated Buffer at Boot Time -- Quick Reference -- Communicating with Hardware -- I/O Ports and I/O Memory -- I/O Registers and Conventional Memory -- Using I/O Ports -- I/O Port Allocation -- Manipulating I/O ports -- I/O Port Access from User Space -- String Operations -- Pausing I/O -- Platform Dependencies -- An I/O Port Example -- An Overview of the Parallel Port -- A Sample Driver -- Using I/O Memory -- I/O Memory Allocation and Mapping -- Accessing I/O Memory -- Ports as I/O Memory -- Reusing short for I/O Memory -- ISA Memory Below 1 MB -- isa_readb and Friends -- Quick Reference -- Interrupt Handling…”
    Tesis
  6. 1146
    Publicado 2021
    Tabla de Contenidos: “…-- Threaded interrupts - to really make it real time -- Constraints when using a threaded handler -- Working with either hardirq or threaded handlers -- Enabling and disabling IRQs -- The NMI…”
    Libro electrónico
  7. 1147
    Publicado 2010
    “…Packed with visuals to help you learn fast Dozens of troubleshooting scenarios Real-world A+ prep advice from experts Easy-to-use exam preparation task lists Do I Know This Already? …”
    Libro electrónico
  8. 1148
    Publicado 2018
    Tabla de Contenidos: “…autovacuum logging -- autovacuum monitoring -- Autovacuum triggering -- Per-table adjustments -- Common vacuum and autovacuum problems -- autovacuum is running even though it was turned off -- autovacuum is constantly running -- Out of memory errors -- Not keeping up with a busy server -- autovacuum is too disruptive -- Long running transactions -- FSM exhaustion -- Recovering from major problems -- Autoanalyze -- Index bloat -- Measuring index bloat -- Detailed data and index page monitoring -- Monitoring query logs -- Basic PostgreSQL log setup -- Log collection -- log_line_prefix -- Multiline queries -- Using syslog for log messages -- CSV logging -- Logging difficult queries -- auto_explain -- Log file analysis -- Normalized query fingerprints -- pg_stat_statements -- pgBadger -- Summary -- Chapter 8: Database Benchmarking -- pgbench default tests -- Table definition -- Scale detection -- Query script definition -- Configuring the database server for pgbench -- Sample server configuration -- Running pgbench manually -- Graphing results with pgbench-tools -- Configuring pgbench-tools -- Customizing for 8.3 -- Sample pgbench test results -- Select-only test -- TPC-B-like test -- Latency analysis -- Sources of bad results and variation -- Developer PostgreSQL builds -- Worker threads and pgbench program limitations -- pgbench custom tests -- Insert speed test -- Transaction Processing Performance Council benchmarks -- Summary -- Chapter 9: Database Indexing -- Indexing example walkthrough -- Measuring query disk and index block statistics -- Running the example -- Sample data setup -- Simple index lookups -- Full table scans -- Index creation -- Lookup with an inefficient index -- Combining indexes -- Switching from indexed to sequential scans -- Planning for plan changes -- Clustering against an index -- Explain with buffer counts…”
    Libro electrónico
  9. 1149
    Publicado 2024
    Tabla de Contenidos: “…-- The OTel project -- OTel -- Summary -- Chapter 12: Distributing Your Apps -- Technical requirements -- Go Modules -- The routine using modules -- CI -- Caching -- Static analysis -- Releasing your application -- Summary -- Part 5: Going Beyond -- Chapter 13: Capstone Project - Distributed Cache -- Technical requirements -- Understanding distributed caching -- System requirements -- Requirements -- Design and trade-offs -- Creating the project -- Thread safety -- Choosing the right approach -- Adding thread safety -- The interface -- TCP -- HTTP -- Others -- Eviction policies -- Sharding -- Summary -- Chapter 14: Effective Coding Practices -- Technical requirements -- Reusing resources -- Using sync.Pool in a network server -- Using sync.Pool for JSON marshaling -- Executing tasks once -- singleflight -- Effective memory mapping -- API usage -- Advanced usage with protection and mapping flags -- Avoiding common performance pitfalls -- Leaking with time.After -- Defer in for loops -- Maps management -- Resource management -- Handling HTTP bodies -- Channel mismanagement -- Summary -- Chapter 15: Stay Sharp with System Programming -- Real-world applications -- Dropbox's leap of faith…”
    Libro electrónico
  10. 1150
    Publicado 2012
    “…Don't Let the Real Test Be Your First Test! CompTIA A+ Certification Practice Exams , Second Edition (Exams 220-801 & 220-802) is filled with more than 1000 realistic practice questions to prepare you for these challenging exams. …”
    Libro electrónico
  11. 1151
    Publicado 2011
    Tabla de Contenidos: “…VARIA annarena aMBrogi: Ricezione in ambito periferico e provinciale dei modelli urbani: il caso dei labra marmorei. Mihai BărBulescu: Libera dans les provinces romaines. …”
    Libro
  12. 1152
    Publicado 2022
    Tabla de Contenidos: “…2.9.1 Newspapers in US and worldwide -- 2.9.2 TV networks in US -- 2.10 Text editing and formatting languages -- 2.11 Online books sources -- 2.12 Free book download web sites -- 2.13 Data, image, audio and video compression -- 2.13.1 Data compression -- 2.13.2 Huffman coding/encoding -- 2.13.3 Lempel-Ziv - LZ encoding -- 2.13.4 Arithmetic coding -- 2.13.5 Miscellaneous topics on data compression -- 2.13.6 Universal Resource Locator - URL shortener -- 2.13.7 Image compression -- 2.13.8 Video/audio compression -- 2.14 Main memory data compression -- 2.15 Data deduplication in storage systems -- 2.15.1 Data deduplication at Microsoft -- 2.15.2 The Venti prototype at Bell Labs/Lucent -- 2.15.3 Data Domain deduplication -- 2.15.4 Datrium -- 2.15.5 Summary of a major survey on data deduplication -- 2.16 Up and coming data deduplication companies -- 2.17 Storage research at IBM's Almaden Research Center in 1990s -- 2.18 Cleversafe and its information dispersal technology -- 2.19 Recent developments at IBM Research at ARC -- 2.20 Storage research at Hewlett-Packard - HP -- 2.21 Primary storage vendors and enterprise companies in 2020 -- 2.22 All-flash upstart storage companies -- 2.23 Hyperconverged infrastructure for storage systems -- 2.24 Top enterprise storage backup players -- 2.25 Data storage companies: up and coming storage vendors -- 2.26 Parallel file systems -- 2.27 Cloud storage -- 2.27.1 Cloud computing price models -- 2.27.2 Storage as a service in cloud computing -- 2.27.3 Cloud storage elasticity and its benchmarking -- 2.28 Jai Menon's predictions on the future of clouds -- 2.29 Cloud storage companies -- 2.30 Distributed systems research related to clouds -- 2.30.1 OceanStore -- 2.30.2 Inktomi and CAP theorem -- 2.30.3 Replicated data -- 2.30.4 Sky Computing -- 2.31 Data encryption -- 2.31.1 Data encryption for cloud storage…”
    Libro electrónico
  13. 1153
    Publicado 2018
    Tabla de Contenidos: “…Starting Nexpose -- Start a scan -- Exploitation -- Post-exploitation -- Infrastructure analysis -- Pillaging -- High-profile targets -- Data exfiltration -- Persistence -- Further penetration into infrastructure -- Cleanup -- Reporting -- Executive summary -- Technical report -- Penetration testing limitations and challenges -- Pentesting maturity and scoring model -- Realism -- Methodology -- Reporting -- Summary -- Chapter 2: Advanced Linux Exploitation -- Linux basics -- Linux commands -- Streams -- Redirection -- Linux directory structure -- Users and groups -- Permissions -- The chmod command -- The chown command -- The chroot command -- The power of the find command -- Jobs, cron, and crontab -- Security models -- Security controls -- Access control models -- Linux attack vectors -- Linux enumeration with LinEnum -- OS detection with Nmap -- Privilege escalation -- Linux privilege checker -- Linux kernel exploitation -- UserLand versus kernel land -- System calls -- Linux kernel subsystems -- Process -- Threads -- Security-Enhanced Linux -- Memory models and the address spaces -- Linux kernel vulnerabilities -- NULL pointer dereference -- Arbitrary kernel read/write -- Case study CVE-2016-2443 Qualcomm MSM debug fs kernel arbitrary write -- Memory corruption vulnerabilities -- Kernel stack vulnerabilities -- Kernel heap vulnerabilities -- Race conditions -- Logical and hardware-related bugs -- Case study CVE-2016-4484 - Cryptsetup Initrd root Shell -- Linux Exploit Suggester -- Buffer overflow prevention techniques -- Address space layout randomization -- Stack canaries -- Non-executable stack -- Linux return oriented programming -- Linux hardening -- Summary -- Chapter 3: Corporate Network and Database Exploitation -- Networking fundamentals -- Network topologies -- Bus topology -- Star topology -- Ring topology -- Tree topology…”
    Libro electrónico
  14. 1154
    Publicado 2016
    “…The book then: Explains the effects of radiation on digital commercial devices, including microprocessors and volatile and nonvolatile memories—static random-access memories (SRAMs), dynamic random-access memories (DRAMs), and Flash memories Examines issues like soft errors, total dose, and displacement damage, together with hardening-by-design solutions for digital circuits, field-programmable gate arrays (FPGAs), and mixed-analog circuits Explores the effects of radiation on fiber optics and imager devices such as complementary metal-oxide-semiconductor (CMOS) sensors and charge-coupled devices (CCDs) Featuring real-world examples, case studies, extensive references, and contributions from leading experts in industry and academia, Ionizing Radiation Effects in Electronics: From Memories to Imagers is suitable both for newcomers who want to become familiar with radiation effects and for radiation experts who are looking for more advanced material or to make effective use of beam time…”
    Libro electrónico
  15. 1155
    por Barr, Michael
    Publicado 1999
    “…The techniques and code examples presented here are directly applicable to real-world embedded software projects of all sorts. …”
    Libro electrónico
  16. 1156
    Publicado 2018
    “…What You Will Learn Participate in the design and definition phase of an embedded product Learn about architectural design patterns and engineering tradeoffs Build an embedded development lab and optimize the workflow Write memory-safe code Understand the architecture behind the most communication interfaces Understand the design and development patterns for connected and distributed devices in the IoT Master multitask parallel execution patterns and real-time operating systems In Detail Embedded systems are self-contained units that have a dedicated purpose within a device. …”
    Libro electrónico
  17. 1157
    Publicado 2023
    “…Users will learn the key differences between the Cortex-M0/M0+/M3 and M4 and M7; how to write C programs to run on Cortex-M based processors; how to make the best use of the CoreSight debug system; the Cortex-M operating modes and memory protection; advanced software techniques that can be used on Cortex-M microcontrollers, and much more. …”
    Libro electrónico
  18. 1158
    por Gregg, Brendan
    Publicado 2013
    “…The text concludes with a detailed case study, showing how a real cloud customer issue was analyzed from start to finish. …”
    Libro electrónico
  19. 1159
    Publicado 2021
    “…By the end of this kernel book, you’ll have a detailed understanding of the fundamentals of writing Linux kernel module code for real-world projects and products.What you will learnWrite high-quality modular kernel code (LKM framework) for 5.x kernelsConfigure and build a kernel from sourceExplore the Linux kernel architectureGet to grips with key internals regarding memory management within the kernelUnderstand and work with various dynamic kernel memory alloc/dealloc APIsDiscover key internals aspects regarding CPU scheduling within the kernelGain an understanding of kernel concurrency issuesFind out how to work with key kernel synchronization primitivesWho this book is forThis book is for Linux programmers beginning to find their way with Linux kernel development. …”
    Libro electrónico
  20. 1160
    Publicado 2018
    “…You’ll explore case studies involving VoltDB, an in-memory, NewSQL database popular with telcos for its ability to handle the speed and scale of fast data. …”
    Libro electrónico