Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 985
- Application software 893
- Engineering and Technology 701
- Physical Sciences 701
- Management 514
- Kierkegaard, Søren 505
- Medicine 480
- Design 419
- Data processing 405
- Health Sciences 381
- History 374
- Computer networks 352
- Life Sciences 326
- Programming 324
- Computer graphics 318
- Web site development 297
- Artificial intelligence 290
- Computer programs 289
- Web sites 288
- Cloud computing 279
- Engineering 277
- Digital techniques 273
- Machine learning 273
- Engineering & Applied Sciences 270
- Research 266
- Photography 260
- Computer software 256
- Operating systems (Computers) 252
- Périodiques 239
- Information technology 223
-
24561Publicado 2013Tabla de Contenidos: “…Geburtstag (1962) 294 -- Die Sorgen und die Macht (1963) 296 -- Antisemitismus in Ostdeutschland (1963) 299 -- Operation Mauerdurchlöcherung. …”
Libro electrónico -
24562Publicado 2022Tabla de Contenidos: “…. -- How it works... -- Using screen -- Getting ready -- How to do it... -- How it works... -- There's more... -- Chapter 2: Using Text Editors -- Technical requirements -- Learning the basics of the Vi(m) Editor -- Getting ready -- How to do it... -- How it works... -- See also -- Learning the basics of the nano editor -- Getting ready -- How to do it... -- There's more... -- Going through the advanced Vi(m) settings -- Getting ready -- How to do it... -- How it works... -- There's more... -- Chapter 3: Using Commands and Services for Process Management -- Technical requirements -- Process management tools -- Getting ready -- How to do it... -- How it works... -- See also -- Managing background jobs -- Getting ready -- How to do it... -- How it works... -- There's more... -- Managing process priorities -- Getting ready -- How to do it... -- How it works... -- There's more... -- Configuring crond -- Getting ready -- How to do it... -- How it works... -- There's more... -- Chapter 4: Using Shell to Configure and Troubleshoot a Network -- Technical requirements -- Using nmcli and netplan -- Getting ready -- How to do it -- How it works -- There's more -- Using firewall-cmd and ufw -- Getting ready -- How to do it -- How it works -- There's more -- Working with open ports and connections -- Getting ready -- How to do it -- How it works -- There's more -- Configuring /etc/hosts and DNS resolving…”
Libro electrónico -
24563Publicado 2003Tabla de Contenidos: “…Using Rational Robot in the Tivoli Management Agent environment -- Rational Robot -- Tivoli Monitoring for Transaction Performance (TMTP) -- The ARM API -- Initial install -- Working with Java Applets -- Running the Java Enabler -- Using the ARM API in Robot scripts -- Rational Robot command line options -- Obfuscating embedded passwords in Rational Scripts -- Rational Robot screen locking solution -- Appendix C. Additional material -- Locating the Web material -- Using the Web material -- System requirements for downloading the Web material -- How to use the Web material -- Abbreviations and acronyms -- Related publications -- IBM Redbooks -- Other resources -- Referenced Web sites -- How to get IBM Redbooks -- IBM Redbooks collections -- Help from IBM -- Index -- Back cover…”
Libro electrónico -
24564Publicado 2014Tabla de Contenidos: “…-- Workbook Wizard Step 6: Creating User-Defined Calculations -- Desktop Calculations Screen -- Plus Calculations Tab -- Calculations: What Are They? …”
Libro electrónico -
24565Publicado 2012Tabla de Contenidos: “…An Introduction to BASH -- Job Control -- Environment Variables -- Printing Environment Variables -- Setting Environment Variables -- Unsetting Environment Variables -- Pipes -- Redirection -- Command-Line Shortcuts -- Filename Expansion -- Environment Variables as Parameters -- Multiple Commands -- Backticks -- Documentation Tools -- The man Command -- The texinfo System -- Files, File Types, File Ownership, and File Permissions -- Normal Files -- Directories -- Hard Links -- Symbolic Links -- Block Devices -- Character Devices -- Named Pipes -- Listing Files: ls -- Change Ownership: chown -- Change Group: chgrp -- Change Mode: chmod -- File Management and Manipulation -- Copy Files: cp -- Move Files: mv -- Link Files: ln -- Find a File: find -- File Compression: gzip -- bzip2 -- Create a Directory: mkdir -- Remove a Directory: rmdir -- Show Present Working Directory: pwd -- Tape Archive: tar -- Concatenate Files: cat -- Display a File One Screen at a Time: more -- Disk Utilization: du -- Show the Directory Location of a File: which -- Locate a Command: whereis -- Disk Free: df -- Synchronize Disks: sync -- Moving a User and Its Home Directory -- List Processes: ps -- Show an Interactive List of Processes: top -- Send a Signal to a Process: kill -- Signals -- Security Issues -- Examples Using the kill Command -- Miscellaneous Tools -- Show System Name: uname -- Who Is Logged In: who -- A Variation on who: w -- Switch User: su -- Editors -- vi -- emacs -- joe -- pico -- Summary -- Chapter 6: Booting and Shutting Down -- Boot Loaders -- GRUB Legacy -- Stage 1 -- Stage 2 -- Conventions Used in GRUB -- Installing GRUB -- Backing Up the MBR -- Installing GRUB Legacy from the GRUB Shell -- USB GRUB Legacy Boot Disk -- Installing GRUB Legacy on the MBR Using a USB GRUB Legacy Disk -- Configuring GRUB Legacy -- Adding a New Kernel to Boot with GRUB Legacy…”
Libro electrónico -
24566
-
24567
-
24568Publicado 2022Tabla de Contenidos: “…253 Table of Contents ntroduction 1 About This Book 1 Foolish Assumptions 2 Icons Used in This Book 3 Beyond the Book 3 Where to Go from Here 4 Part 1: Getting to Know Security Awareness 5 Chapter 1: Knowing How Security Awareness Programs Work 7 Understanding the Benefits of Security Awareness 8 Reducing losses from phishing attacks 8 Reducing losses by reducing risk 9 Grasping how users initiate loss 10 Knowing How Security Awareness Programs Work 11 Establishing and measuring goals 12 Showing users how to "do things right" 14 Recognizing the Role of Awareness within a Security Program 15 Disputing the Myth of the Human Firewall 16 Chapter 2: Starting On the Right Foot: Avoiding What Doesn't Work 19 Making a Case Beyond Compliance Standards 20 Treating Compliance as a Must 21 Motivating users to take action 22 Working within the compliance budget 22 Limiting the Popular Awareness Theories 23 Applying psychology to a diverse user base 23 Differentiating between marketing and awareness 24 Distinguishing Social Engineering from Security Awareness 26 Addressing Mental Models That Don't Work 27 Making Perfection the Stated Goal 28 Measuring from the Start 29 Prioritizing Program Over Product 29 Choosing Substance Over Style 30 Understanding the Role of Security Awareness 31 Chapter 3: Applying the Science Behind Human Behavior and Risk Management 33 Achieving Common Sense through Common Knowledge 34 Borrowing Ideas from Safety Science 35 Recognizing incidents as system failures 36 Responding to incidents 37 Applying Accounting Practices to Security Awareness 37 Applying the ABCs of Awareness 39 Benefiting from Group Psychology 40 The ABCs of behavioral science 41 The Fogg Behavior Model 42 Relating B:MAP to the ABCs of awareness and behavior 43 The Forgetting Curve 44 Remembering That It's All About Risk 45 Optimizing risk 46 The risk formula 46 Part 2: Building a Security Awareness Program 51 Chapter 4: Creating a Security Awareness Strategy 53 Identifying the Components of an Awareness Program 54 Choosing effective communications tools 55 Picking topics based on business drivers 56 Knowing when you're a success 57 Figuring Out How to Pay for It All 58 Chapter 5: Determining Culture and Business Drivers 61 Understanding Your Organization's Culture 62 Determining security culture 64 Recognizing how culture relates to business drivers 65 Identifying Subcultures 65 Interviewing Stakeholders 67 Requesting stakeholder interviews 67 Scheduling the interviews 70 Creating interview content 70 Taking names 72 Partnering with Other Departments 72 Chapter 6: Choosing What to Tell The Users 75 Basing Topics on Business Drivers 76 Incorporating Personal Awareness Topics 76 Motivating Users to Do Things "Right" 77 Common Topics Covered in Security Awareness Programs 79 Phishing 79 Social engineering 80 Texting and instant messaging security 80 Physical security 81 Malware 81 Ransomware 81 Password security 82 Cloud security 82 USB device security 82 Internet of Things 83 Travel security 83 Wi-Fi security 84 Mobile devices 84 Work from home 84 Basic computer security 85 Insider threat 85 Protecting children on the internet 85 Social media security 86 Moving security 86 Compliance topics 87 Chapter 7: Choosing the Best Tools for the Job 89 Identifying Security Ambassadors 90 Finding ambassadors 90 Maintaining an ambassador program 91 Knowing the Two Types of Communications Tools 92 Reminding users to take action 93 Requiring interaction from users 93 Exploring Your Communications Arsenal 95 Knowledgebase 95 Posters 96 Hardcopy newsletters 97 Monitor displays 97 Screen savers 98 Pamphlets 98 Desk drops 99 Table tents 99 Coffee cups or sleeves 99 Stickers 100 Mouse pads 100 Pens and other useful giveaways 100 Camera covers 101 Squishy toys and other fun giveaways 101 Active communications tools 101 Chapter 8: Measuring Performance 107 Knowing the Hidden Cost of Awareness Efforts 108 Meeting Compliance Requirements 109 Collecting Engagement Metrics 111 Attendance metrics 111 Likability metrics 112 Knowledge metrics 112 Measuring Improved Behavior 113 Tracking the number of incidents 113 Examining behavior with simulations 114 Tracking behavior with gamification 116 Demonstrating a Tangible Return on Investment 116 Recognizing Intangible Benefits of Security Awareness 117 Knowing Where You Started: Day 0 Metrics 118 Part 3: Putting Your Security Awareness Program Into Action 119 Chapter 9: Assembling Your Security Awareness Program 121 Knowing Your Budget 122 Finding additional sources for funding 123 Allocating for your musts 125 Limiting your discretionary budget 126 Appreciating your team as your most valuable resource 126 Choosing to Implement One Program or Multiple Programs 127 Managing multiple programs 128 Beginning with one program 128 Gaining Support from Management 129 Devising a Quarterly Delivery Strategy 131 Ensuring that your message sticks 133 Distributing topics over three months 133 Deciding Whether to Include Phishing Simulations 136 Planning Which Metrics to Collect and When 137 Considering metrics versus topics 137 Choosing three behavioral metrics 138 Incorporating Day 0 metrics 138 Scheduling periodic updates 138 Biasing your metrics 139 Branding Your Security Awareness Program 139 Creating a theme 139 Maintaining brand consistency 140 Coming up with a catchphrase and logo 140 Promoting your program with a mascot 140 Chapter 10: Running Your Security Awareness Program 143 Nailing the Logistics 144 Determining sources or vendors 144 Scheduling resources and distribution 145 Contracting vendors 145 Recognizing the role of general project management 146 Getting All Required Approvals 146 Getting the Most from Day 0 Metrics 147 Creating Meaningful Reports 149 Presenting reports as a graphical dashboard 149 Adding index scores 152 Creating an awareness index 152 Reevaluating Your Program 153.…”
Libro electrónico -
24569Publicado 2024Tabla de Contenidos: “…-- Microsoft Intune -- High-level architecture components and responsibilities -- Configuration Manager support -- Co-management and Windows 365 -- Disaster recovery -- Sizes and performance of fixed-price licenses -- GPU-Enhanced Cloud PCs -- Connect to your on-premises network -- Provisioning policies -- Windows 365 - gallery images -- Custom images -- Windows Updates via Autopatch -- Roles and delegation -- The Watchdog service -- Optimized Teams on Windows 365 -- Screen capture protection and watermarking -- Migrate GPOs to a Settings Catalog policy -- Summary -- Questions -- Answers -- Further reading -- Chapter 5: Deploying Windows 365 -- Technical requirements for deploying Windows 365 -- Required URLs -- RDP requirements and optimizations -- Connect to on-premises networks (optional) -- Purchasing and assigning Cloud PC licenses -- Provision a Cloud PC -- Image management - creating a custom image (optional) -- Reprovisioning a Cloud PC -- Local administrator permissions -- Security baselines for a Cloud PC -- Zero Trust: Conditional Access management for Cloud PCs -- Connecting to your Cloud PC -- Windows App -- Deploy Windows App via Intune -- Windows App - User Actions -- Bulk User Actions via Intune -- Supported redirections per endpoint platform -- Windows 365 Boot shared mode -- Windows 365 Boot dedicated mode -- What if you have multiple Cloud PCs? …”
Libro electrónico -
24570Publicado 2024Tabla de Contenidos: “…Family holiday movies -- Cutting to a beat -- General techniques -- Cutting angles with a green screen -- Adding adjustment layers -- Storing callouts -- Storing titles and corporate intros -- Using workspaces -- Collapsing clips into connected storylines -- Summary -- Part 3: Using the Inspector -- Chapter 10: The Inspector Controls -- The four main tabs of the inspector -- The Video inspector -- Section 1 - Effects -- Section 2 - Transform -- Sections 3 and 4 - Crop and Distort -- Sections 5 and 6 - Stabilization and Rolling Shutter -- Section 7 - Spatial Conform -- The Color inspector -- Color Board -- Color Wheels -- The Audio inspector -- Audio Enhancements -- Audio Analysis -- Pan -- Effects -- Audio Configuration -- Save Audio Effects Preset -- The Information inspector -- Project information -- Library information -- Export information -- The Titles inspector -- The Text inspector -- Text division -- Position division -- The Face checkbox -- The Generator inspector -- The Transition inspector -- Summary -- Chapter 11: Using Built-In Plug-Ins -- An explanation of plug-in terminology -- Plug-ins - general knowledge -- Built-in plug-ins -- Using built-in titles -- Using built-in generators -- Using built-in effects -- Using built-in transitions -- Creating custom plug-ins from built-in plug-ins -- Summary -- Chapter 12: Using Third-Party Plug-Ins -- Free plug-ins -- Andy's plug-ins -- BretFX Power Tools Lite -- Purchasable plug-ins -- Lock & -- Load Stabilize -- PaintX -- Keyper -- Neat Video noise reduction -- Titles plug-ins -- Audio correction plug-ins -- Eric Lenz -- Captionator -- Workflow extensions -- LUTs -- Uninstalling plug-ins -- Manually uninstalling plug-ins -- Summary -- Chapter 13: Using Keyframes to Animate Objects in Final Cut Pro -- What is a keyframe? …”
Libro electrónico -
24571Publicado 2024Tabla de Contenidos: “…Modifying the design for use on the board -- Introducing a few other external memory types -- QDR SRAM -- HyperRAM -- SPI RAM -- Summary -- Questions -- Answers -- Challenge -- Further reading -- Chapter 10: A Better Way to Display - VGA -- Technical requirements -- Project 12 - Introducing the VGA -- Defining registers -- Coding a simple AXI-Lite interface -- Generating timing for the VGA -- The VGA monitor timing generator -- Displaying text -- Requesting memory -- Testing the VGA controller -- Examining the constraints -- Summary -- Questions -- Answer -- Challenge -- Further reading -- Chapter 11: Bringing It All Together -- Technical requirements -- Investigating the keyboard interface -- Project 13 - Handling the keyboard -- Testing the PS/2 -- Project 14 - Bringing it all together -- Displaying PS/2 keycodes on the VGA screen -- Displaying the temperature sensor data -- Adding a custom character to the text ROM -- Displaying audio data -- Summary -- Questions -- Answers -- Challenge -- Further reading -- Chapter 12: Using the PMOD Connectors - SPI and UART -- Technical requirements -- UART PMOD -- ACL2 PMOD -- Understanding Peripheral Modules (PMODs) -- PMOD Type 1 and 1A -- PMOD Type 2 and 2A -- PMOD Type 3 and 3A -- PMOD Type 4, 5, and 5A -- PMOD Type 6 and 6A -- PMOD Type 7 and 7A -- Introduction to Universal Asynchronous Receiver-Transmitter (UART) -- Bus interface -- Waveform -- Register interface -- RBR - Receive Buffer Register -- THR - Transmit Holding Register -- IER - Interrupt Enable Register -- ISR - Interrupt Status Register -- FCR - FIFO Control Register -- LCR - Line Control Register -- MCR - Modem Control Register -- LSR - Line Status Register -- MSR - Modem Status Register -- SCRATCH - Scratch Pad Register -- DLL, DLM - Divisor Register LSB and MSB -- UART Implementation -- CPU Interface -- UART Core -- My UART origins…”
Libro electrónico -
24572Publicado 2022Libro electrónico
-
24573por Vanhove, SanderTabla de Contenidos: “…-- Additional exercises - Sharpening the axe -- Summary -- Quiz time -- Chapter 10: Creating Menus, Making Enemies, and Using Autoloads -- Technical requirements -- Creating a menu -- Control nodes -- Creating a basic start menu -- Setting the main scene -- Making enemies -- Constructing the base scene -- Navigating enemies -- Writing the enemy script -- Damaging the player in a collision -- Spawning enemies and collectibles -- Making a Game Over screen -- Shooting projectiles -- Creating the base scene -- Writing the logic of the projectile -- Spawning projectiles -- Storing highscores in autoloads -- Using an autoload -- Creating a HighscoreManager autoload -- Autoloads in the remote tree -- Adding a UI in the main menu and game scene -- Using the highscore in the main menu -- Additional exercises - Sharpening the axe -- Summary -- Quiz time -- Chapter 11: Playing Together with Multiplayer -- Technical requirements -- A crash course in computer networking -- What is a Transport Layer? …”
Publicado 2024
Libro electrónico -
24574Evaluation of enzyme inhibitors in drug discovery a guide for medicinal chemists and pharmacologistspor Copeland, Robert AllenTabla de Contenidos: “…Assay Considerations for Compound Library Screening.4.1 Defining Inhibition Signal Robustness, and Hit Criteria.4.2 Measuring Initial Velocity.4.2.1 End-Point and Kinetic Readouts.4.2.2 Effects of Enzyme Concentration.4.3 Balanced Assay Conditions.4.3.1 Balancing Conditions for Multisubstrate Reactions.4.4 Order of Reagent Addition.4.5 Use of Natural Substrates and Enzymes.4.6 Coupled Enzyme Assays.4.7 Hit Validation and Progression.4.8 Summary.References.5. …”
Publicado 2013
Universidad Loyola - Universidad Loyola Granada (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca)Enlace del recurso
Libro electrónico -
24575Publicado 2017Tabla de Contenidos: “…Assessing the Emergence and Background Information of the Suspicion -- Screening the Cases: When Children Are not Interviewed -- Support for the Children and Families -- Concluding Remarks and Future Directions -- References -- 8 Sequential Interviews with Preschool Children in Norwegian Barnahus -- Introduction -- Challenges Encountered When Interviewing Preschool Children -- The Standard Model in Norway: The Dialogical Communication Method (DCM) -- Developing the Sequential Interview (SI) Model -- Extended Forensic Interviews (EFI) -- Methodology -- Key Differences Between the Standard Method (DCM) and Sequential Interviews (SI) -- Preparations -- Legal Participants -- Collecting Information -- Information Sharing -- Interview Sessions -- The First Session -- The First Break -- The Second Session -- The Last Break -- The Last Session -- Final Reflections -- References -- Part III Children's Rights Perspectives -- 9 Child Friendly Justice: International Obligations and the Challenges of Interagency Collaboration -- Introduction -- The Method of Interdisciplinary Child Rights Justice Systems Analysis -- Aim -- Data -- The Elements of the Analysis of Interdisciplinary Child Rights Justice Systems -- International Instruments -- Main Principles Governing the Processes of Handling Child Sexual Abuse Cases -- A Step-by-Step Descriptive Analysis-an Illustrative Process Diagram of the Justice Systems -- The Views of Major Stakeholders and Focus Group -- Tensions and Challenges Within the Justice Systems -- Barnahus in Iceland-Developments and Challenges -- Critical Analysis -- Parallel Processes -- Set Routines -- The Focus of Collaboration and the Flow of Information -- Long Distances -- Child Explorative Interviews -- Child Investigative Interviews -- Mutual Preparation and Follow-up After Interviews -- Participation of the Child…”
Libro electrónico -
24576Publicado 2022Tabla de Contenidos: “…-- Turn it off -- Chapter 3 Getting Going -- Update the Operating System -- Update with iPhone -- Update directly from your Apple Watch -- Check Out the Apps -- Activity -- Alarms, Stopwatch, Timer, and World Clock -- Audiobooks -- Blood Oxygen -- Calculator -- Calendar -- Camera Remote -- Compass -- Cycle Tracking -- ECG -- Find People -- Heart Rate -- Home -- Mail -- Maps -- Memoji -- Messages -- Mindfulness -- Music -- News -- Noise -- Now Playing -- Phone -- Photos -- Podcasts -- Radio -- Reminders -- Remote -- Sleep -- Stocks -- Voice Memos -- Walkie-Talkie -- Wallet and Apple Pay -- Weather -- Workout -- Organize Apps and Install New Ones -- Organize apps on your Home screen -- Install new apps…”
Libro electrónico -
24577Publicado 2019Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Dedication -- About Packt -- Contributors -- Table of Contents -- Preface -- Section 1: Getting Started with wiringPi on a Raspberry Pi -- Chapter 1: Introduction to the Raspberry Pi -- Technical requirements -- Software required -- Hardware requirements -- For Raspberry Pi 3B+ and Raspberry Pi Zero W -- Additional hardware for Raspberry Pi 3B+ -- Additional hardware requirements for Raspberry Pi Zero W -- Understanding the Raspberry Pi -- The Raspberry Pi 3B+ -- The Raspberry Pi Zero W -- Setting up a Raspberry Pi 3B+ as a desktop computer -- Installing Raspbian OS on an SD card -- Downloading and installing Etcher -- Downloading the Raspbian Stretch image -- Writing the Raspbian Stretch image to a microSD card -- Setting up the Raspberry Pi 3B+ -- Connecting the Raspberry Pi 3B+ to the internet -- Connecting the Raspberry Pi 3B+ to a laptop via Wi-Fi -- Creating an SSH file on a microSD card -- Connecting the Raspberry Pi 3B+ to a Wi-Fi network using PuTTY -- Enabling the VNC server -- Viewing the Raspberry Pi output on the VNC Viewer -- Increase the VNC's screen resolution -- Handling VNC and PuTTY errors -- Setting up the Raspberry Pi Zero W as a desktop computer -- Setting up the Raspberry Pi Zero W -- Connecting the Raspberry Pi Zero W to a laptop via Wi-Fi -- Connecting the Raspberry Pi Zero W to a Wi-Fi network using PuTTY -- Enabling VNC Viewer for Raspberry Pi Zero W -- Viewing Raspberry Pi Zero W output on VNC Viewer -- Summary -- Questions -- Chapter 2: Implementing Blink with wiringPi -- Technical requirements -- Installing the wiringPi library in the Raspberry Pi -- Accessing Raspberry Pi GPIO pins via wiringPi -- Making an LED blink -- Wiring connections -- The blinking program -- Uploading the code to the Raspberry Pi -- Smart light - working with digital sensor…”
Libro electrónico -
24578Animating SwiftUI applications create visually stunning and engaging animations for IOS with SwiftUIpor DeStefano, StephenTabla de Contenidos: “…Adding the wave's animatableData property -- Setting up the ContentView for animation -- Duplicating and animating the wave shape in the ContentView -- Adding an animated floating buoy to the ocean scene -- Making the buoy light blink -- Making the buoy move -- Adding the buoy to the scene -- Adding sound effects -- Summary -- Chapter 11: Animating an Elevator -- Technical requirements -- Setting up the project and adding a Binding variable -- Assembling the elevator using images and the GeometryReader view -- Putting people inside the elevator -- Creating a data model and using the ObservableObject protocol -- Adding the data model functions -- Adding the doorOpenTimer function -- Adding the playChimeSound function -- Adding the playDoorOpenCloseSound function -- Adding the floorNumbers function -- Adding the stopTimer function -- Adding the background, a button, and animating the doors -- Adding floor indicator lights -- Summary -- Chapter 12: Creating a Word Game (Part 1) -- Technical requirements -- Setting up the project and creating a data model -- Building out the UI by adding a text field and list -- Displaying a character count next to each word in the list -- Checking the entered words for duplicates -- Adding a random word with a button press -- Checking if the user's entered word is possible -- Checking whether the user's entered word is a real word -- Creating HeaderView with an info button -- Creating PickerView -- Adding PickerView -- Styling PickerView -- Summary -- Chapter 13: Creating a Word Game (Part 2) -- Technical requirements -- Creating a settings screen -- Adding the language buttons -- Adding a checkmark -- Adding a dismiss button -- Styling the UI -- Adding the background -- Adding animations to the game word -- Implementing user feedback with alerts -- Adding a Footer View to display more information…”
Publicado 2023
Libro electrónico -
24579Publicado 2018Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Packt Upsell -- Contributors -- Table of Contents -- Preface -- Chapter 1: Review of TCP/IP Protocol Suite and Python -- An overview of the internet -- Servers, hosts, and network components -- The rise of data centers -- Enterprise data centers -- Cloud data centers -- Edge data centers -- The OSI model -- Client-server model -- Network protocol suites -- The transmission control protocol -- Functions and characteristics of TCP -- TCP messages and data transfer -- User datagram protocol -- The internet protocol -- The IP NAT and security -- IP routing concepts -- Python language overview -- Python versions -- Operating system -- Running a Python program -- Python built-in types -- The None type -- Numerics -- Sequences -- Mapping -- Sets -- Python operators -- Python control flow tools -- Python functions -- Python classes -- Python modules and packages -- Summary -- Chapter 2: Low-Level Network Device Interactions -- The challenges of the CLI -- Constructing a virtual lab -- Cisco VIRL -- VIRL tips -- Cisco DevNet and dCloud -- GNS3 -- Python Pexpect library -- Pexpect installation -- Pexpect overview -- Our first Pexpect program -- More Pexpect features -- Pexpect and SSH -- Putting things together for Pexpect -- The Python Paramiko library -- Installation of Paramiko -- Paramiko overview -- Our first Paramiko program -- More Paramiko features -- Paramiko for servers -- Putting things together for Paramiko -- Looking ahead -- Downsides of Pexpect and Paramiko compared to other tools -- Idempotent network device interaction -- Bad automation speeds bad things up -- Summary -- Chapter 3: APIs and Intent-Driven Networking -- Infrastructure as code -- Intent-Driven Networking -- Screen scraping versus API structured output -- Data modeling for infrastructure as code -- The Cisco API and ACI…”
Libro electrónico -
24580Publicado 2017Tabla de Contenidos: “…Cover -- Copyright -- Credits -- Foreword -- About the Author -- About the Reviewer -- www.PacktPub.com -- Customer Feedback -- Table of Contents -- Preface -- Chapter 1: Review of TCP/IP Protocol Suite and Python Language -- The internet overview -- Servers, hosts, and network components -- The rise of datacenter -- Enterprise datacenters -- Cloud datacenters -- Edge datacenters -- The OSI model -- Client server models -- Network protocol suites -- The Transmission Control Protocol (TCP) -- Functions and Characteristics of TCP -- TCP messages and data transfer -- User Datagram Protocol (UDP) -- The Internet Protocol (IP) -- The IP NAT and security -- IP routing concepts -- Python language overview -- Python versions -- Operating system -- Running a Python program -- Python built-In types -- The None type -- Numerics -- Sequences -- Mapping -- Sets -- Python operators -- Python control flow tools -- Python functions -- Python classes -- Python modules and packages -- Summary -- Chapter 2: Low-Level Network Device Interactions -- The challenges of CLI -- Constructing a virtual lab -- Cisco Virtual Internet Routing Lab (VIRL) -- VIRL tips -- Cisco DevNet and dCloud -- GNS3 -- Python Pexpect Library -- Installation -- The Pexpect overview -- Our first Expect program -- More Pexpect features -- Pexpect and SSH -- Putting things together for Pexpect -- The Python Paramiko library -- Installating Paramiko -- The Paramiko overview -- Our first Paramiko program -- More Paramiko features -- Paramiko for Servers -- Putting things together for Paramiko -- Looking ahead -- Downsides of Pexpect and Paramiko compared to other tools -- Idempotent network device interaction -- Bad automation speeds bad things up -- Summary -- Chapter 3: API and Intent-Driven Networking -- Infrastructure as the Python code -- Screen scraping versus API structured output…”
Libro electrónico