top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
IPhone and iPad apps for absolute beginners / / Rory Lewis and Chad Mello ; foreword by Ben Easton
IPhone and iPad apps for absolute beginners / / Rory Lewis and Chad Mello ; foreword by Ben Easton
Autore Lewis Rory
Edizione [3rd ed. 2013.]
Pubbl/distr/stampa New York : , : Apress, , 2013
Descrizione fisica 1 online resource (xxii, 366 pages) : illustrations (some color)
Disciplina 004.167
005.028
Collana Gale eBooks
Soggetto topico iPhone (Smartphone) - Programming
iPad (Computer) - Programming
Application software - Development
iPhone (Smartphone) - Computer software
iPad (Computer) - Computer software
Application software - Design
ISBN 1-4302-4618-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Title Page; Copyright Page; Table of Contents; Foreword: About the Author; Why You'll Relate to Dr. Lewis; Fast-Forward 17 Years; Past-Present-Future; Why Write This Book?; About the Contributing Authors; Acknowledgments; Preface; What This Book Will Do For You; Sound Familiar?; How Do I Know This About You?; The Approach I Take; Chapter 1: Preliminaries; Necessities and Accessories; Getting a Mac; Getting OS X; Becoming a Developer; Making Your Choice; Installing Xcode; Getting Ready for Your First iPhone/iPad Project; Installing DemoMonkey; Chapter 2: Blast-Off!
Running your App on the iPhone SimulatorRunning Your iPhone App on the iPad Simulator; Running Your iPad App on the iPad Simulator; Digging the Code; Chapter 3: Keep on Truckin'; helloWorld_03: An Interactive Single View App; Creating the User Interface; Connecting to the Code; Digging the Code: -(IBAction)button: (id)sender; ; Setting up the Coding Environment; Creating a Programming Roadmap; Digging the Code; Nibs, Zibs, and Xibs; Methods; Header Files; The Inspector Bar; Chapter 4: Buttons and Labels with Multiple Graphics; Roadmap Recap; helloWorld_04: A View-Based Application
Understanding IBOutlets and IBActionsUsing pointers; Properties: Management and Control; Adding IBActions; Digging the Code; IBOutlets and IBActions; More About Pointers; Model-View-Controller; Chapter 5: Touches; Redefining "Giving Up"; Roadmap Recap; Touches: A View-Based Application; CGAffineTransform Structs; Coding the Implementation File; viewDidLoad; Coding the Shrink Button; Coding the Hide Button; Coding the Change Button; Running the Code; Digging the Code; Chapter 6: Switches; Don't Freak Out: Let's Look at Your Brain!; switches: A Tabbed Application; Obtaining the Resources
Creating the AppAdding the Images to the Project; Running the App; Customizing the Views; Customizing the Buttons; Creating the Second View; Connecting and Coding the Buttons; Digging the Code; Compile-time and Runtime; Chapter 7: Storyboards; Storytelling; Roadmap Recap; Evolve: A View-Based Storyboard Application; Phase I: Creating Core Storyboarding Configurations; Phase II: Setting Up and Establishing the Content of the View Controllers; Phase III: Working on Closure and Coding; Chapter 8: Introducing MapKit; A Little About Frameworks; MapKit Showcase: Preinstalled Apps
Turn-by-Turn NavigationTraffic: A Smarter Way to Cope; Local Search; See More, Do More; Innovative and Popular MapKit Apps Inspire Us; MyMapKit_01: A Universal Single View Application; Preliminaries; A New Single View Template; Preliminaries: Adding the MapKit Framework; Bring in the Images!; Finishing the View Controllers; Making It Go: Running Your First MapKit App; Time to Show Off!; Chapter 9: MapKit with a Little More Effort; Understanding Map Geometry and Coordinate Systems; Important Things to Know; myMapkit_02: A Single View iPad Application; Possible Prepping for the App
Preliminaries
Record Nr. UNINA-9910735401203321
Lewis Rory  
New York : , : Apress, , 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Learn ECMAScript : discover the latest ECMAScript features in order to write cleaner code and learn the fundamentals of JavaScript / / Mehul Mohan, Narayan Prusty
Learn ECMAScript : discover the latest ECMAScript features in order to write cleaner code and learn the fundamentals of JavaScript / / Mehul Mohan, Narayan Prusty
Autore Mohan Mehul
Edizione [Second edition.]
Pubbl/distr/stampa Birmingham, [England] ; ; Mumbai, [India] : , : Packt, , 2018
Descrizione fisica 1 online resource (298 pages)
Disciplina 005.2762
Soggetto topico JavaScript (Computer program language)
Application software - Design
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910794625903321
Mohan Mehul  
Birmingham, [England] ; ; Mumbai, [India] : , : Packt, , 2018
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Learn ECMAScript : discover the latest ECMAScript features in order to write cleaner code and learn the fundamentals of JavaScript / / Mehul Mohan, Narayan Prusty
Learn ECMAScript : discover the latest ECMAScript features in order to write cleaner code and learn the fundamentals of JavaScript / / Mehul Mohan, Narayan Prusty
Autore Mohan Mehul
Edizione [Second edition.]
Pubbl/distr/stampa Birmingham, [England] ; ; Mumbai, [India] : , : Packt, , 2018
Descrizione fisica 1 online resource (298 pages)
Disciplina 005.2762
Soggetto topico JavaScript (Computer program language)
Application software - Design
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910812172403321
Mohan Mehul  
Birmingham, [England] ; ; Mumbai, [India] : , : Packt, , 2018
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Learning pentesting for Android devices : a practical guide to learning penetration testing for Android devices and applications / / Aditya Gupta ; foreword by Elad Shapira ; cover Image by Michal Jasej
Learning pentesting for Android devices : a practical guide to learning penetration testing for Android devices and applications / / Aditya Gupta ; foreword by Elad Shapira ; cover Image by Michal Jasej
Autore Gupta Aditya
Pubbl/distr/stampa Birmingham, England : , : Packt Publishing, , 2014
Descrizione fisica 1 online resource (154 p.)
Disciplina 005.3
Collana Community Experience Distilled
Soggetto topico Application software - Design
Application software - Development
Computer networks - Security measures
Soggetto genere / forma Electronic books.
ISBN 1-78328-899-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Copyright; Credits; Foreword; About the Author; Acknowledgments; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Getting Started with Android Security; Introduction to Android; Digging deeper into Android; Sandboxing and the permission model; Application signing; Android startup process; Summary; Chapter 2: Preparing the Battlefield; Setting up the development environment; Creating an Android virtual device; Useful utilities for Android Pentest; Android Debug Bridge; Burp Suite; APKTool; Summary; Chapter 3: Reversing and Auditing Android Apps
Android application teardownReversing an Android application; Using Apktool to reverse an Android application; Auditing Android applications; Content provider leakage; Insecure file storage; Path traversal vulnerability/local file inclusion; Client-side injection attacks; OWASP top 10 for mobile; Summary; Chapter 4: Traffic Analysis for Android Devices; Android traffic interception; Ways of Android traffic analysis; Passive analysis; Active analysis; HTTPS Proxy interception; Other ways for SSL Traffic interception; Extracting sensitive files from packet capture; Summary
Chapter 5: Android ForensicsTypes of forensics; Filesystems; Android filesystem partitions; Using dd to extract data; Using a custom recovery image; Using Andriller to extract an application's data; Using AFLogical to extract contacts, calls, and text messages; Dumping application databases manually; Logging the logcat; Using backup to extract an application's data; Summary; Chapter 6: Playing with SQLite; Understanding SQLite in depth; Analyzing a simple application using SQLite; Security vulnerability; Summary; Chapter 7: Lesser-known Android Attacks; Android WebView vulnerability
Using WebView in the applicationIdentifying the vulnerability; Infecting legitimate APKs; Vulnerabilities in ad libraries; Cross Application Scripting in Android (XAS); Summary; Chapter 8: ARM Exploitation; Introduction to ARM architecture; Execution modes; Setting up the environment; Simple stack-based buffer overflow; Return-oriented programming; Android root exploits; Summary; Chapter 9: Writing the Pentest Report; Basics of a penetration testing report; Writing the pentest report; Executive summary; Vulnerabilities; Scope of the work; Tools used; Testing methodologies followed
RecommendationsConclusion; Appendix; Summary; Index
Record Nr. UNINA-9910453751403321
Gupta Aditya  
Birmingham, England : , : Packt Publishing, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Learning pentesting for Android devices : a practical guide to learning penetration testing for Android devices and applications / / Aditya Gupta ; foreword by Elad Shapira ; cover Image by Michal Jasej
Learning pentesting for Android devices : a practical guide to learning penetration testing for Android devices and applications / / Aditya Gupta ; foreword by Elad Shapira ; cover Image by Michal Jasej
Autore Gupta Aditya
Pubbl/distr/stampa Birmingham, England : , : Packt Publishing, , 2014
Descrizione fisica 1 online resource (154 p.)
Disciplina 005.3
Collana Community Experience Distilled
Soggetto topico Application software - Design
Application software - Development
Computer networks - Security measures
ISBN 1-78328-899-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Copyright; Credits; Foreword; About the Author; Acknowledgments; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Getting Started with Android Security; Introduction to Android; Digging deeper into Android; Sandboxing and the permission model; Application signing; Android startup process; Summary; Chapter 2: Preparing the Battlefield; Setting up the development environment; Creating an Android virtual device; Useful utilities for Android Pentest; Android Debug Bridge; Burp Suite; APKTool; Summary; Chapter 3: Reversing and Auditing Android Apps
Android application teardownReversing an Android application; Using Apktool to reverse an Android application; Auditing Android applications; Content provider leakage; Insecure file storage; Path traversal vulnerability/local file inclusion; Client-side injection attacks; OWASP top 10 for mobile; Summary; Chapter 4: Traffic Analysis for Android Devices; Android traffic interception; Ways of Android traffic analysis; Passive analysis; Active analysis; HTTPS Proxy interception; Other ways for SSL Traffic interception; Extracting sensitive files from packet capture; Summary
Chapter 5: Android ForensicsTypes of forensics; Filesystems; Android filesystem partitions; Using dd to extract data; Using a custom recovery image; Using Andriller to extract an application's data; Using AFLogical to extract contacts, calls, and text messages; Dumping application databases manually; Logging the logcat; Using backup to extract an application's data; Summary; Chapter 6: Playing with SQLite; Understanding SQLite in depth; Analyzing a simple application using SQLite; Security vulnerability; Summary; Chapter 7: Lesser-known Android Attacks; Android WebView vulnerability
Using WebView in the applicationIdentifying the vulnerability; Infecting legitimate APKs; Vulnerabilities in ad libraries; Cross Application Scripting in Android (XAS); Summary; Chapter 8: ARM Exploitation; Introduction to ARM architecture; Execution modes; Setting up the environment; Simple stack-based buffer overflow; Return-oriented programming; Android root exploits; Summary; Chapter 9: Writing the Pentest Report; Basics of a penetration testing report; Writing the pentest report; Executive summary; Vulnerabilities; Scope of the work; Tools used; Testing methodologies followed
RecommendationsConclusion; Appendix; Summary; Index
Record Nr. UNINA-9910791060703321
Gupta Aditya  
Birmingham, England : , : Packt Publishing, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Learning pentesting for Android devices : a practical guide to learning penetration testing for Android devices and applications / / Aditya Gupta ; foreword by Elad Shapira ; cover Image by Michal Jasej
Learning pentesting for Android devices : a practical guide to learning penetration testing for Android devices and applications / / Aditya Gupta ; foreword by Elad Shapira ; cover Image by Michal Jasej
Autore Gupta Aditya
Pubbl/distr/stampa Birmingham, England : , : Packt Publishing, , 2014
Descrizione fisica 1 online resource (154 p.)
Disciplina 005.3
Collana Community Experience Distilled
Soggetto topico Application software - Design
Application software - Development
Computer networks - Security measures
ISBN 1-78328-899-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Copyright; Credits; Foreword; About the Author; Acknowledgments; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Getting Started with Android Security; Introduction to Android; Digging deeper into Android; Sandboxing and the permission model; Application signing; Android startup process; Summary; Chapter 2: Preparing the Battlefield; Setting up the development environment; Creating an Android virtual device; Useful utilities for Android Pentest; Android Debug Bridge; Burp Suite; APKTool; Summary; Chapter 3: Reversing and Auditing Android Apps
Android application teardownReversing an Android application; Using Apktool to reverse an Android application; Auditing Android applications; Content provider leakage; Insecure file storage; Path traversal vulnerability/local file inclusion; Client-side injection attacks; OWASP top 10 for mobile; Summary; Chapter 4: Traffic Analysis for Android Devices; Android traffic interception; Ways of Android traffic analysis; Passive analysis; Active analysis; HTTPS Proxy interception; Other ways for SSL Traffic interception; Extracting sensitive files from packet capture; Summary
Chapter 5: Android ForensicsTypes of forensics; Filesystems; Android filesystem partitions; Using dd to extract data; Using a custom recovery image; Using Andriller to extract an application's data; Using AFLogical to extract contacts, calls, and text messages; Dumping application databases manually; Logging the logcat; Using backup to extract an application's data; Summary; Chapter 6: Playing with SQLite; Understanding SQLite in depth; Analyzing a simple application using SQLite; Security vulnerability; Summary; Chapter 7: Lesser-known Android Attacks; Android WebView vulnerability
Using WebView in the applicationIdentifying the vulnerability; Infecting legitimate APKs; Vulnerabilities in ad libraries; Cross Application Scripting in Android (XAS); Summary; Chapter 8: ARM Exploitation; Introduction to ARM architecture; Execution modes; Setting up the environment; Simple stack-based buffer overflow; Return-oriented programming; Android root exploits; Summary; Chapter 9: Writing the Pentest Report; Basics of a penetration testing report; Writing the pentest report; Executive summary; Vulnerabilities; Scope of the work; Tools used; Testing methodologies followed
RecommendationsConclusion; Appendix; Summary; Index
Record Nr. UNINA-9910822306003321
Gupta Aditya  
Birmingham, England : , : Packt Publishing, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Mastering hyper-V 2012 R2 with system center and windows azure / / John Savill ; acquisitions editor, Mariann Barsolo ; development editor, Kim Beaudet ; technical editor, Sean Deuby ; book designers, Maureen Forys, Judy Fung
Mastering hyper-V 2012 R2 with system center and windows azure / / John Savill ; acquisitions editor, Mariann Barsolo ; development editor, Kim Beaudet ; technical editor, Sean Deuby ; book designers, Maureen Forys, Judy Fung
Autore Savill John
Pubbl/distr/stampa Indianapolis, Indiana : , : Wiley, , 2014
Descrizione fisica 1 online resource (578 p.)
Disciplina 005.4476
Soggetto topico Application software - Design
Cloud computing
Web services
Workflow management systems - Computer programs
Soggetto genere / forma Electronic books.
ISBN 1-118-82815-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Title Page; Copyright; Contents; Chapter 1 Introduction to Virtualization and Microsoft Solutions; The Evolution of the Datacenter; One Box, One Operating System; How Virtualization Has Changed the Way Companies Work and Its Key Values; History of Hyper-V; Windows Server 2008 Hyper-V Features; Windows Server 2008 R2 Changes; Windows Server 2008 R2 Service Pack 1; Windows Server 2012 Hyper-V Changes; Windows Server 2012 R2; Licensing of Hyper-V; One Operating System (Well, Two, but Really One); Choosing the Version of Hyper-V; The Role of System Center with Hyper-V
System Center Configuration ManagerSystem Center Virtual Machine Manager and App Controller; System Center Operations Manager; System Center Data Protection Manager; System Center Service Manager; System Center Orchestrator; Clouds and Services; The Bottom Line; Chapter 2 Virtual Machine Resource Fundamentals; Understanding VMBus; The Anatomy of a Virtual Machine; Generation 1 Virtual Machine; Generation 2 Virtual Machine; Processor Resources; Virtual Processor to Logical Processor Scheduling; Processor Assignment; NUMA Support; Memory Resources; Virtual Storage; VHD; VHDX
Creating a Virtual Hard DiskPass-Through Storage; The Bottom Line; Chapter 3 Virtual Networking; Virtual Switch Fundamentals; Three Types of Virtual Switch; Creating a Virtual Switch; Extensible Switch; VLANs and PVLANS; Understanding VLANs; VLANs and Hyper-V; PVLANs; How SCVMM Simplifies Networking with Hyper-V; SCVMM Networking Architecture; Deploying Networking with SCVMM 2012 R2; Network Virtualization; Network Virtualization Overview; Implementing Network Virtualization; Useful Network Virtualization Commands; Network Virtualization Gateway; Summary; VMQ, RSS, and SR-IOV; SR-IOV; DVMQ
RSS and vRSSNIC Teaming; Host Virtual Adapters and Types of Networks Needed in a Hyper-V Host; Types of Guest Network Adapters; Monitoring Virtual Traffic; The Bottom Line; Chapter 4 Storage Configurations; Storage Fundamentals and VHDX; Types of Controllers; Common VHDX Maintenance Actions; Performing Dynamic VHDX Resize; Storage Spaces and Windows as a Storage Solution; Server Message Block (SMB) Usage; SMB Technologies; Using SMB for Hyper-V Storage; iSCSI with Hyper-V; Using the Windows iSCSI Target; Using the Windows iSCSI Initiator; Considerations for Using iSCSI
Understanding Virtual Fibre ChannelLeveraging Shared VHDX; Data Deduplication and Hyper-V; Storage Quality of Service; SAN Storage and SCVMM; The Bottom Line; Chapter 5 Managing Hyper-V; Installing Hyper-V; Using Configuration Levels; Enabling the Hyper-V Role; Actions after Installation of Hyper-V; Deploying Hyper-V Servers with SCVMM; Hyper-V Management Tools; Using Hyper-V Manager; Core Actions Using PowerShell; Securing the Hyper-V Server; Creating and Managing a Virtual Machine; Creating and Using Hyper-V Templates; Hyper-V Integration Services and Supported Operating Systems
Migrating Physical Servers and Virtual Machines to Hyper-V Virtual Machines
Record Nr. UNINA-9910453435003321
Savill John  
Indianapolis, Indiana : , : Wiley, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Mastering hyper-V 2012 R2 with system center and windows azure / / John Savill ; acquisitions editor, Mariann Barsolo ; development editor, Kim Beaudet ; technical editor, Sean Deuby ; book designers, Maureen Forys, Judy Fung
Mastering hyper-V 2012 R2 with system center and windows azure / / John Savill ; acquisitions editor, Mariann Barsolo ; development editor, Kim Beaudet ; technical editor, Sean Deuby ; book designers, Maureen Forys, Judy Fung
Autore Savill John
Pubbl/distr/stampa Indianapolis, Indiana : , : Wiley, , 2014
Descrizione fisica 1 online resource (578 p.)
Disciplina 005.4476
Soggetto topico Application software - Design
Cloud computing
Web services
Workflow management systems - Computer programs
ISBN 1-118-82833-X
1-118-82815-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Title Page; Copyright; Contents; Chapter 1 Introduction to Virtualization and Microsoft Solutions; The Evolution of the Datacenter; One Box, One Operating System; How Virtualization Has Changed the Way Companies Work and Its Key Values; History of Hyper-V; Windows Server 2008 Hyper-V Features; Windows Server 2008 R2 Changes; Windows Server 2008 R2 Service Pack 1; Windows Server 2012 Hyper-V Changes; Windows Server 2012 R2; Licensing of Hyper-V; One Operating System (Well, Two, but Really One); Choosing the Version of Hyper-V; The Role of System Center with Hyper-V
System Center Configuration ManagerSystem Center Virtual Machine Manager and App Controller; System Center Operations Manager; System Center Data Protection Manager; System Center Service Manager; System Center Orchestrator; Clouds and Services; The Bottom Line; Chapter 2 Virtual Machine Resource Fundamentals; Understanding VMBus; The Anatomy of a Virtual Machine; Generation 1 Virtual Machine; Generation 2 Virtual Machine; Processor Resources; Virtual Processor to Logical Processor Scheduling; Processor Assignment; NUMA Support; Memory Resources; Virtual Storage; VHD; VHDX
Creating a Virtual Hard DiskPass-Through Storage; The Bottom Line; Chapter 3 Virtual Networking; Virtual Switch Fundamentals; Three Types of Virtual Switch; Creating a Virtual Switch; Extensible Switch; VLANs and PVLANS; Understanding VLANs; VLANs and Hyper-V; PVLANs; How SCVMM Simplifies Networking with Hyper-V; SCVMM Networking Architecture; Deploying Networking with SCVMM 2012 R2; Network Virtualization; Network Virtualization Overview; Implementing Network Virtualization; Useful Network Virtualization Commands; Network Virtualization Gateway; Summary; VMQ, RSS, and SR-IOV; SR-IOV; DVMQ
RSS and vRSSNIC Teaming; Host Virtual Adapters and Types of Networks Needed in a Hyper-V Host; Types of Guest Network Adapters; Monitoring Virtual Traffic; The Bottom Line; Chapter 4 Storage Configurations; Storage Fundamentals and VHDX; Types of Controllers; Common VHDX Maintenance Actions; Performing Dynamic VHDX Resize; Storage Spaces and Windows as a Storage Solution; Server Message Block (SMB) Usage; SMB Technologies; Using SMB for Hyper-V Storage; iSCSI with Hyper-V; Using the Windows iSCSI Target; Using the Windows iSCSI Initiator; Considerations for Using iSCSI
Understanding Virtual Fibre ChannelLeveraging Shared VHDX; Data Deduplication and Hyper-V; Storage Quality of Service; SAN Storage and SCVMM; The Bottom Line; Chapter 5 Managing Hyper-V; Installing Hyper-V; Using Configuration Levels; Enabling the Hyper-V Role; Actions after Installation of Hyper-V; Deploying Hyper-V Servers with SCVMM; Hyper-V Management Tools; Using Hyper-V Manager; Core Actions Using PowerShell; Securing the Hyper-V Server; Creating and Managing a Virtual Machine; Creating and Using Hyper-V Templates; Hyper-V Integration Services and Supported Operating Systems
Migrating Physical Servers and Virtual Machines to Hyper-V Virtual Machines
Record Nr. UNINA-9910790931003321
Savill John  
Indianapolis, Indiana : , : Wiley, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Mastering hyper-V 2012 R2 with system center and windows azure / / John Savill ; acquisitions editor, Mariann Barsolo ; development editor, Kim Beaudet ; technical editor, Sean Deuby ; book designers, Maureen Forys, Judy Fung
Mastering hyper-V 2012 R2 with system center and windows azure / / John Savill ; acquisitions editor, Mariann Barsolo ; development editor, Kim Beaudet ; technical editor, Sean Deuby ; book designers, Maureen Forys, Judy Fung
Autore Savill John
Pubbl/distr/stampa Indianapolis, Indiana : , : Wiley, , 2014
Descrizione fisica 1 online resource (578 p.)
Disciplina 005.4476
Soggetto topico Application software - Design
Cloud computing
Web services
Workflow management systems - Computer programs
ISBN 1-118-82833-X
1-118-82815-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Title Page; Copyright; Contents; Chapter 1 Introduction to Virtualization and Microsoft Solutions; The Evolution of the Datacenter; One Box, One Operating System; How Virtualization Has Changed the Way Companies Work and Its Key Values; History of Hyper-V; Windows Server 2008 Hyper-V Features; Windows Server 2008 R2 Changes; Windows Server 2008 R2 Service Pack 1; Windows Server 2012 Hyper-V Changes; Windows Server 2012 R2; Licensing of Hyper-V; One Operating System (Well, Two, but Really One); Choosing the Version of Hyper-V; The Role of System Center with Hyper-V
System Center Configuration ManagerSystem Center Virtual Machine Manager and App Controller; System Center Operations Manager; System Center Data Protection Manager; System Center Service Manager; System Center Orchestrator; Clouds and Services; The Bottom Line; Chapter 2 Virtual Machine Resource Fundamentals; Understanding VMBus; The Anatomy of a Virtual Machine; Generation 1 Virtual Machine; Generation 2 Virtual Machine; Processor Resources; Virtual Processor to Logical Processor Scheduling; Processor Assignment; NUMA Support; Memory Resources; Virtual Storage; VHD; VHDX
Creating a Virtual Hard DiskPass-Through Storage; The Bottom Line; Chapter 3 Virtual Networking; Virtual Switch Fundamentals; Three Types of Virtual Switch; Creating a Virtual Switch; Extensible Switch; VLANs and PVLANS; Understanding VLANs; VLANs and Hyper-V; PVLANs; How SCVMM Simplifies Networking with Hyper-V; SCVMM Networking Architecture; Deploying Networking with SCVMM 2012 R2; Network Virtualization; Network Virtualization Overview; Implementing Network Virtualization; Useful Network Virtualization Commands; Network Virtualization Gateway; Summary; VMQ, RSS, and SR-IOV; SR-IOV; DVMQ
RSS and vRSSNIC Teaming; Host Virtual Adapters and Types of Networks Needed in a Hyper-V Host; Types of Guest Network Adapters; Monitoring Virtual Traffic; The Bottom Line; Chapter 4 Storage Configurations; Storage Fundamentals and VHDX; Types of Controllers; Common VHDX Maintenance Actions; Performing Dynamic VHDX Resize; Storage Spaces and Windows as a Storage Solution; Server Message Block (SMB) Usage; SMB Technologies; Using SMB for Hyper-V Storage; iSCSI with Hyper-V; Using the Windows iSCSI Target; Using the Windows iSCSI Initiator; Considerations for Using iSCSI
Understanding Virtual Fibre ChannelLeveraging Shared VHDX; Data Deduplication and Hyper-V; Storage Quality of Service; SAN Storage and SCVMM; The Bottom Line; Chapter 5 Managing Hyper-V; Installing Hyper-V; Using Configuration Levels; Enabling the Hyper-V Role; Actions after Installation of Hyper-V; Deploying Hyper-V Servers with SCVMM; Hyper-V Management Tools; Using Hyper-V Manager; Core Actions Using PowerShell; Securing the Hyper-V Server; Creating and Managing a Virtual Machine; Creating and Using Hyper-V Templates; Hyper-V Integration Services and Supported Operating Systems
Migrating Physical Servers and Virtual Machines to Hyper-V Virtual Machines
Record Nr. UNINA-9910818693703321
Savill John  
Indianapolis, Indiana : , : Wiley, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Speed Metrics Guide [[electronic resource] ] : Choosing the Right Metrics to Use When Evaluating Websites / / by Matthew Edgar
Speed Metrics Guide [[electronic resource] ] : Choosing the Right Metrics to Use When Evaluating Websites / / by Matthew Edgar
Autore Edgar Matthew
Edizione [1st ed. 2024.]
Pubbl/distr/stampa Berkeley, CA : , : Apress : , : Imprint : Apress, , 2024
Descrizione fisica 1 online resource (246 pages)
Disciplina 006.76
Soggetto topico Web site development
Application software - Development
High performance computing
Application software - Design
ISBN 979-88-6880-155-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Table of Contents -- About the Author -- Introduction -- Part I: Initial Connection -- Chapter 1: DNS Lookup Time -- What DNS Lookup Time Measures -- DNS Resolution Steps -- How a Visitor's Geographic Location Affects DNS Lookup Time -- DNS TTL: IP Address Cache Duration -- Optimal DNS TTL Value -- Implications of Third-party Resources -- Measuring DNS Lookup Time -- DNS Lookup Time Benchmarks -- Global DNS Lookup Time: DNS Speed Benchmark -- Domain Connections: WebPageTest -- Dig Test: DiG GUI -- Ways to Improve DNS Lookup Time -- Select Faster DNS Provider -- Prefetch Third-Party Domains: dns-prefetch and preconnect -- Recap: When to Use DNS Lookup Time -- Chapter 2: Time to First Byte (TTFB) -- What Time to First Byte Measures -- Process Before the Server Sends the First Byte -- How Servers Build a Response -- How Redirects Impact TTFB -- Scenario 1: Redirect Destination URL on the Same Domain -- Scenario 2: Redirect Destination URL on Another Domain -- Implications of Third-party Resources -- Measuring Time to First Byte -- TTFB Benchmarks -- TTFB by Location: KeyCDN Performance Test -- TTFB Details: Byte Check -- TTFB Additional Details: WebPageTest -- Ways to Improve Time to First Byte -- Caching Internal Resources -- Choose Faster Hosting Provider -- Recap: When to Use Time to First Byte -- Part II: Displaying the Page -- Chapter 3: DOMContentLoaded Time -- What DOMContentLoaded Measures -- HTML Parsing -- Document Object Model (DOM) -- How CSS Affects Parsing -- How JavaScript Affects Parsing -- Measuring DOMContentLoaded -- DCL Time Benchmarks -- DOM Size Benchmarks -- Browser Timings: GTmetrix -- DOM Elements: PageSpeed Insights -- DOM Nodes: Google Chrome DevTools -- Ways to Improve DOMContentLoaded -- HTML Reduction -- Changing How JavaScript Loads: Async and Defer -- Asynchronous Loading -- Deferring JavaScript Load.
Recap: When to Use DOMContentLoaded -- Chapter 4: Total Requests and Transfer Size -- What Total Requests and Transfer Size Measure -- Requested File Types -- Fetch Priority -- Compression -- How Images Are Compressed -- How Other Files Are Compressed -- Measuring Total Requests and Transfer Size -- Total Request Benchmarks -- Transfer Size Benchmarks -- Transfer Size and Resource Size: Chrome DevTools -- Total Requests by Type: WebPageTest -- Ways to Improve Total Requests and Transfer Size -- Consolidating Multiple JavaScript or CSS Files -- Domain Sharding and Third-Party Hosts -- Make the Files Smaller: Minification -- When to Use Total Requests and Transfer Size -- Chapter 5: First Contentful Paint -- What First Contentful Paint Measures -- Critical Rendering Path -- CSS Object Model (CSSOM) and Style Calculation -- Layout and Reflow -- Content Evaluated by FCP -- Related Metrics: Start Render and First Paint -- How Fonts Affect Painting -- Measuring First Contentful Paint -- FCP Benchmarks -- Visualizing FCP: GTmetrix and WebPageTest -- Critical Rendering Path Details: Chrome DevTools -- Ways to Improve First Contentful Paint -- Font Loading: Avoiding FOIT and FOUT -- Lazy Load: Image and Iframe -- When to Use First Contentful Paint -- Part III: Completing the Website Load -- Chapter 6: Time to Interactive and Total Blocking Time -- What Time to Interactive and Total Blocking Time Measure -- Main Thread -- Defining Long Task and Task Blocking Time -- Visitor Interactions When the Main Thread Is Blocked -- When TTI Occurs -- Comparing Importance: TTI vs. TBT -- Measuring Time to Interactive and Total Blocking Time -- TBT and TTI Benchmarks -- Visualize TTI: GTmetrix Speed Visualization -- Main Thread Processing: WebPageTest -- Find Long Tasks: Chrome DevTools -- Ways to Improve Total Blocking Time and  Time to Interactive.
Simplify Layout Calculation and Painting: Avoid Layout Thrashing -- Move Work Off the Main Thread: Web Workers -- When to Use Total Blocking Time and Time to Interactive -- Chapter 7: Total Load: Onload Time, Fully Loaded Time, Speed Index -- What Do Onload Time, Fully Loaded Time, and Speed Index Measure -- Onload Time and Dependent Resources -- Fully Loaded Time and Network Idle Time -- Speed Index and Visually Complete -- Determining When the Website Finishes Loading -- Measuring Total Load Metrics -- Onload Time Benchmarks -- Fully Loaded Time Benchmarks -- Speed Index Benchmarks -- Onload and Fully Loaded Time: GTmetrix -- Speed Index and Visual Progress: WebPageTest -- Ways to Improve Total Load Time -- Progress Indicators Improve Perception of Speed -- Recap: When to Use Total Load Metrics -- Part IV: Core Web Vitals -- Chapter 8: Largest Contentful Paint -- What Largest Contentful Paint Measures -- Viewport and First Viewport -- Defining "Largest" -- How LCP Compares to FCP -- When LCP Occurs -- Measuring Largest Contentful Paint -- LCP Benchmarks -- Identify LCP Element: WebPageTest -- Measuring Visitor Viewport Size: GA4 -- Ways to Improve Largest Contentful Paint -- Preload LCP Elements -- Use Faster Image Formats: WebP and AVIF -- Recap: When to Use Largest Contentful Paint -- Chapter 9: Cumulative Layout Shift -- What Cumulative Layout Shift Measures -- Shifting Elements -- Layout Shift -- Layout Shifts That Are Not Evaluated -- Expected vs. Unexpected Shifts -- How Layout Shifting Is Scored -- Session Windows -- How CLS Relates to Speed -- Measuring Cumulative Layout Shift -- CLS Benchmarks -- Identify What Shifts and Session Windows: WebPageTest -- Find Shifting Element Coordinates and Viewport Size: Chrome DevTools -- Ways to Improve Cumulative Layout Shift -- Identify Late-Running JavaScript Files -- Reserve Space.
Recap: When to Use Cumulative Layout Shift -- Chapter 10: Interaction to Next Paint -- What Interaction to Next Paint Measures -- Events and Event Handler Code -- Interaction Process -- Measuring Interactions -- How INP Relates to FID -- How INP Relates to the DOM -- How INP Compares to Total Blocking Time and  Time to Interactive -- Measuring Interaction to Next Paint -- INP Benchmarks -- Simulate Interactions: DebugBear's INP Profiler -- Breakdown INP: Web Vitals Extension -- Find Event Handler Code: Firefox DevTools -- Ways to Improve Interaction to Next Paint -- Processing Time: Improve Event Handler Code -- Presentation Delay: Optimize Animations -- Recap: When to Use Interaction to Next Paint -- Chapter 11: Conclusion: Choosing Website Speed Metrics -- Summary -- Appendix A: Metrics Recap -- Regular Monitoring -- Core Web Vitals - SEO and UX -- Speed KPIs -- Deeper Diagnostic -- For General Communication -- Appendix B: PageSpeed Insights -- Field Data -- Lab Data -- Opportunities and Diagnostics -- Appendix C: References and Additional Information -- Chapter 1 -- Chapter 2 -- Chapter 3 -- Chapter 4 -- Chapter 5 -- Chapter 6 -- Chapter 7 -- Chapter 8 -- Chapter 9 -- Chapter 10 -- Appendix B -- Index.
Record Nr. UNINA-9910838270803321
Edgar Matthew  
Berkeley, CA : , : Apress : , : Imprint : Apress, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui