top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
IPhone and iPad apps for absolute beginners / / Rory Lewis and Chad Mello
IPhone and iPad apps for absolute beginners / / Rory Lewis and Chad Mello
Autore Lewis Rory
Edizione [3rd ed.]
Pubbl/distr/stampa New York, : Apress, c2013
Descrizione fisica 1 online resource (xxii, 366 pages) : illustrations (some color)
Disciplina 005.26
Altri autori (Persone) MelloChad
Collana Gale eBooks
Soggetto topico iPhone (Smartphone) - Programming
iPad (Computer) - Programming
Application software - Development
iPhone (Smartphone)
iPad (Computer)
Application software - Design
ISBN 9781430246183
1430246189
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Title Page; Copyright Page; Table of Contents; Foreword: About the Author; Why You'll Relate to Dr. Lewis; Fast-Forward 17 Years; Past-Present-Future; Why Write This Book?; About the Contributing Authors; Acknowledgments; Preface; What This Book Will Do For You; Sound Familiar?; How Do I Know This About You?; The Approach I Take; Chapter 1: Preliminaries; Necessities and Accessories; Getting a Mac; Getting OS X; Becoming a Developer; Making Your Choice; Installing Xcode; Getting Ready for Your First iPhone/iPad Project; Installing DemoMonkey; Chapter 2: Blast-Off!
Running your App on the iPhone SimulatorRunning Your iPhone App on the iPad Simulator; Running Your iPad App on the iPad Simulator; Digging the Code; Chapter 3: Keep on Truckin'; helloWorld_03: An Interactive Single View App; Creating the User Interface; Connecting to the Code; Digging the Code: -(IBAction)button: (id)sender; ; Setting up the Coding Environment; Creating a Programming Roadmap; Digging the Code; Nibs, Zibs, and Xibs; Methods; Header Files; The Inspector Bar; Chapter 4: Buttons and Labels with Multiple Graphics; Roadmap Recap; helloWorld_04: A View-Based Application
Understanding IBOutlets and IBActionsUsing pointers; Properties: Management and Control; Adding IBActions; Digging the Code; IBOutlets and IBActions; More About Pointers; Model-View-Controller; Chapter 5: Touches; Redefining "Giving Up"; Roadmap Recap; Touches: A View-Based Application; CGAffineTransform Structs; Coding the Implementation File; viewDidLoad; Coding the Shrink Button; Coding the Hide Button; Coding the Change Button; Running the Code; Digging the Code; Chapter 6: Switches; Don't Freak Out: Let's Look at Your Brain!; switches: A Tabbed Application; Obtaining the Resources
Creating the AppAdding the Images to the Project; Running the App; Customizing the Views; Customizing the Buttons; Creating the Second View; Connecting and Coding the Buttons; Digging the Code; Compile-time and Runtime; Chapter 7: Storyboards; Storytelling; Roadmap Recap; Evolve: A View-Based Storyboard Application; Phase I: Creating Core Storyboarding Configurations; Phase II: Setting Up and Establishing the Content of the View Controllers; Phase III: Working on Closure and Coding; Chapter 8: Introducing MapKit; A Little About Frameworks; MapKit Showcase: Preinstalled Apps
Turn-by-Turn NavigationTraffic: A Smarter Way to Cope; Local Search; See More, Do More; Innovative and Popular MapKit Apps Inspire Us; MyMapKit_01: A Universal Single View Application; Preliminaries; A New Single View Template; Preliminaries: Adding the MapKit Framework; Bring in the Images!; Finishing the View Controllers; Making It Go: Running Your First MapKit App; Time to Show Off!; Chapter 9: MapKit with a Little More Effort; Understanding Map Geometry and Coordinate Systems; Important Things to Know; myMapkit_02: A Single View iPad Application; Possible Prepping for the App
Preliminaries
Record Nr. UNINA-9910735401203321
Lewis Rory  
New York, : Apress, c2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Learn ECMAScript : discover the latest ECMAScript features in order to write cleaner code and learn the fundamentals of JavaScript / / Mehul Mohan, Narayan Prusty
Learn ECMAScript : discover the latest ECMAScript features in order to write cleaner code and learn the fundamentals of JavaScript / / Mehul Mohan, Narayan Prusty
Autore Mohan Mehul
Edizione [Second edition.]
Pubbl/distr/stampa Birmingham, [England] ; ; Mumbai, [India] : , : Packt, , 2018
Descrizione fisica 1 online resource (298 pages)
Disciplina 005.2762
Soggetto topico JavaScript (Computer program language)
Application software - Design
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910794625903321
Mohan Mehul  
Birmingham, [England] ; ; Mumbai, [India] : , : Packt, , 2018
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Learn ECMAScript : discover the latest ECMAScript features in order to write cleaner code and learn the fundamentals of JavaScript / / Mehul Mohan, Narayan Prusty
Learn ECMAScript : discover the latest ECMAScript features in order to write cleaner code and learn the fundamentals of JavaScript / / Mehul Mohan, Narayan Prusty
Autore Mohan Mehul
Edizione [Second edition.]
Pubbl/distr/stampa Birmingham, [England] ; ; Mumbai, [India] : , : Packt, , 2018
Descrizione fisica 1 online resource (298 pages)
Disciplina 005.2762
Soggetto topico JavaScript (Computer program language)
Application software - Design
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910812172403321
Mohan Mehul  
Birmingham, [England] ; ; Mumbai, [India] : , : Packt, , 2018
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Learning pentesting for Android devices : a practical guide to learning penetration testing for Android devices and applications / / Aditya Gupta ; foreword by Elad Shapira ; cover Image by Michal Jasej
Learning pentesting for Android devices : a practical guide to learning penetration testing for Android devices and applications / / Aditya Gupta ; foreword by Elad Shapira ; cover Image by Michal Jasej
Autore Gupta Aditya
Pubbl/distr/stampa Birmingham, England : , : Packt Publishing, , 2014
Descrizione fisica 1 online resource (154 p.)
Disciplina 005.3
Collana Community Experience Distilled
Soggetto topico Application software - Design
Application software - Development
Computer networks - Security measures
Soggetto genere / forma Electronic books.
ISBN 1-78328-899-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Copyright; Credits; Foreword; About the Author; Acknowledgments; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Getting Started with Android Security; Introduction to Android; Digging deeper into Android; Sandboxing and the permission model; Application signing; Android startup process; Summary; Chapter 2: Preparing the Battlefield; Setting up the development environment; Creating an Android virtual device; Useful utilities for Android Pentest; Android Debug Bridge; Burp Suite; APKTool; Summary; Chapter 3: Reversing and Auditing Android Apps
Android application teardownReversing an Android application; Using Apktool to reverse an Android application; Auditing Android applications; Content provider leakage; Insecure file storage; Path traversal vulnerability/local file inclusion; Client-side injection attacks; OWASP top 10 for mobile; Summary; Chapter 4: Traffic Analysis for Android Devices; Android traffic interception; Ways of Android traffic analysis; Passive analysis; Active analysis; HTTPS Proxy interception; Other ways for SSL Traffic interception; Extracting sensitive files from packet capture; Summary
Chapter 5: Android ForensicsTypes of forensics; Filesystems; Android filesystem partitions; Using dd to extract data; Using a custom recovery image; Using Andriller to extract an application's data; Using AFLogical to extract contacts, calls, and text messages; Dumping application databases manually; Logging the logcat; Using backup to extract an application's data; Summary; Chapter 6: Playing with SQLite; Understanding SQLite in depth; Analyzing a simple application using SQLite; Security vulnerability; Summary; Chapter 7: Lesser-known Android Attacks; Android WebView vulnerability
Using WebView in the applicationIdentifying the vulnerability; Infecting legitimate APKs; Vulnerabilities in ad libraries; Cross Application Scripting in Android (XAS); Summary; Chapter 8: ARM Exploitation; Introduction to ARM architecture; Execution modes; Setting up the environment; Simple stack-based buffer overflow; Return-oriented programming; Android root exploits; Summary; Chapter 9: Writing the Pentest Report; Basics of a penetration testing report; Writing the pentest report; Executive summary; Vulnerabilities; Scope of the work; Tools used; Testing methodologies followed
RecommendationsConclusion; Appendix; Summary; Index
Record Nr. UNINA-9910453751403321
Gupta Aditya  
Birmingham, England : , : Packt Publishing, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Learning pentesting for Android devices : a practical guide to learning penetration testing for Android devices and applications / / Aditya Gupta ; foreword by Elad Shapira ; cover Image by Michal Jasej
Learning pentesting for Android devices : a practical guide to learning penetration testing for Android devices and applications / / Aditya Gupta ; foreword by Elad Shapira ; cover Image by Michal Jasej
Autore Gupta Aditya
Pubbl/distr/stampa Birmingham, England : , : Packt Publishing, , 2014
Descrizione fisica 1 online resource (154 p.)
Disciplina 005.3
Collana Community Experience Distilled
Soggetto topico Application software - Design
Application software - Development
Computer networks - Security measures
ISBN 1-78328-899-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Copyright; Credits; Foreword; About the Author; Acknowledgments; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Getting Started with Android Security; Introduction to Android; Digging deeper into Android; Sandboxing and the permission model; Application signing; Android startup process; Summary; Chapter 2: Preparing the Battlefield; Setting up the development environment; Creating an Android virtual device; Useful utilities for Android Pentest; Android Debug Bridge; Burp Suite; APKTool; Summary; Chapter 3: Reversing and Auditing Android Apps
Android application teardownReversing an Android application; Using Apktool to reverse an Android application; Auditing Android applications; Content provider leakage; Insecure file storage; Path traversal vulnerability/local file inclusion; Client-side injection attacks; OWASP top 10 for mobile; Summary; Chapter 4: Traffic Analysis for Android Devices; Android traffic interception; Ways of Android traffic analysis; Passive analysis; Active analysis; HTTPS Proxy interception; Other ways for SSL Traffic interception; Extracting sensitive files from packet capture; Summary
Chapter 5: Android ForensicsTypes of forensics; Filesystems; Android filesystem partitions; Using dd to extract data; Using a custom recovery image; Using Andriller to extract an application's data; Using AFLogical to extract contacts, calls, and text messages; Dumping application databases manually; Logging the logcat; Using backup to extract an application's data; Summary; Chapter 6: Playing with SQLite; Understanding SQLite in depth; Analyzing a simple application using SQLite; Security vulnerability; Summary; Chapter 7: Lesser-known Android Attacks; Android WebView vulnerability
Using WebView in the applicationIdentifying the vulnerability; Infecting legitimate APKs; Vulnerabilities in ad libraries; Cross Application Scripting in Android (XAS); Summary; Chapter 8: ARM Exploitation; Introduction to ARM architecture; Execution modes; Setting up the environment; Simple stack-based buffer overflow; Return-oriented programming; Android root exploits; Summary; Chapter 9: Writing the Pentest Report; Basics of a penetration testing report; Writing the pentest report; Executive summary; Vulnerabilities; Scope of the work; Tools used; Testing methodologies followed
RecommendationsConclusion; Appendix; Summary; Index
Record Nr. UNINA-9910791060703321
Gupta Aditya  
Birmingham, England : , : Packt Publishing, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Learning pentesting for Android devices : a practical guide to learning penetration testing for Android devices and applications / / Aditya Gupta ; foreword by Elad Shapira ; cover Image by Michal Jasej
Learning pentesting for Android devices : a practical guide to learning penetration testing for Android devices and applications / / Aditya Gupta ; foreword by Elad Shapira ; cover Image by Michal Jasej
Autore Gupta Aditya
Pubbl/distr/stampa Birmingham, England : , : Packt Publishing, , 2014
Descrizione fisica 1 online resource (154 p.)
Disciplina 005.3
Collana Community Experience Distilled
Soggetto topico Application software - Design
Application software - Development
Computer networks - Security measures
ISBN 1-78328-899-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Copyright; Credits; Foreword; About the Author; Acknowledgments; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Getting Started with Android Security; Introduction to Android; Digging deeper into Android; Sandboxing and the permission model; Application signing; Android startup process; Summary; Chapter 2: Preparing the Battlefield; Setting up the development environment; Creating an Android virtual device; Useful utilities for Android Pentest; Android Debug Bridge; Burp Suite; APKTool; Summary; Chapter 3: Reversing and Auditing Android Apps
Android application teardownReversing an Android application; Using Apktool to reverse an Android application; Auditing Android applications; Content provider leakage; Insecure file storage; Path traversal vulnerability/local file inclusion; Client-side injection attacks; OWASP top 10 for mobile; Summary; Chapter 4: Traffic Analysis for Android Devices; Android traffic interception; Ways of Android traffic analysis; Passive analysis; Active analysis; HTTPS Proxy interception; Other ways for SSL Traffic interception; Extracting sensitive files from packet capture; Summary
Chapter 5: Android ForensicsTypes of forensics; Filesystems; Android filesystem partitions; Using dd to extract data; Using a custom recovery image; Using Andriller to extract an application's data; Using AFLogical to extract contacts, calls, and text messages; Dumping application databases manually; Logging the logcat; Using backup to extract an application's data; Summary; Chapter 6: Playing with SQLite; Understanding SQLite in depth; Analyzing a simple application using SQLite; Security vulnerability; Summary; Chapter 7: Lesser-known Android Attacks; Android WebView vulnerability
Using WebView in the applicationIdentifying the vulnerability; Infecting legitimate APKs; Vulnerabilities in ad libraries; Cross Application Scripting in Android (XAS); Summary; Chapter 8: ARM Exploitation; Introduction to ARM architecture; Execution modes; Setting up the environment; Simple stack-based buffer overflow; Return-oriented programming; Android root exploits; Summary; Chapter 9: Writing the Pentest Report; Basics of a penetration testing report; Writing the pentest report; Executive summary; Vulnerabilities; Scope of the work; Tools used; Testing methodologies followed
RecommendationsConclusion; Appendix; Summary; Index
Record Nr. UNINA-9910822306003321
Gupta Aditya  
Birmingham, England : , : Packt Publishing, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Mastering hyper-V 2012 R2 with system center and windows azure / / John Savill ; acquisitions editor, Mariann Barsolo ; development editor, Kim Beaudet ; technical editor, Sean Deuby ; book designers, Maureen Forys, Judy Fung
Mastering hyper-V 2012 R2 with system center and windows azure / / John Savill ; acquisitions editor, Mariann Barsolo ; development editor, Kim Beaudet ; technical editor, Sean Deuby ; book designers, Maureen Forys, Judy Fung
Autore Savill John
Pubbl/distr/stampa Indianapolis, Indiana : , : Wiley, , 2014
Descrizione fisica 1 online resource (578 p.)
Disciplina 005.4476
Soggetto topico Application software - Design
Cloud computing
Web services
Workflow management systems - Computer programs
Soggetto genere / forma Electronic books.
ISBN 1-118-82815-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Title Page; Copyright; Contents; Chapter 1 Introduction to Virtualization and Microsoft Solutions; The Evolution of the Datacenter; One Box, One Operating System; How Virtualization Has Changed the Way Companies Work and Its Key Values; History of Hyper-V; Windows Server 2008 Hyper-V Features; Windows Server 2008 R2 Changes; Windows Server 2008 R2 Service Pack 1; Windows Server 2012 Hyper-V Changes; Windows Server 2012 R2; Licensing of Hyper-V; One Operating System (Well, Two, but Really One); Choosing the Version of Hyper-V; The Role of System Center with Hyper-V
System Center Configuration ManagerSystem Center Virtual Machine Manager and App Controller; System Center Operations Manager; System Center Data Protection Manager; System Center Service Manager; System Center Orchestrator; Clouds and Services; The Bottom Line; Chapter 2 Virtual Machine Resource Fundamentals; Understanding VMBus; The Anatomy of a Virtual Machine; Generation 1 Virtual Machine; Generation 2 Virtual Machine; Processor Resources; Virtual Processor to Logical Processor Scheduling; Processor Assignment; NUMA Support; Memory Resources; Virtual Storage; VHD; VHDX
Creating a Virtual Hard DiskPass-Through Storage; The Bottom Line; Chapter 3 Virtual Networking; Virtual Switch Fundamentals; Three Types of Virtual Switch; Creating a Virtual Switch; Extensible Switch; VLANs and PVLANS; Understanding VLANs; VLANs and Hyper-V; PVLANs; How SCVMM Simplifies Networking with Hyper-V; SCVMM Networking Architecture; Deploying Networking with SCVMM 2012 R2; Network Virtualization; Network Virtualization Overview; Implementing Network Virtualization; Useful Network Virtualization Commands; Network Virtualization Gateway; Summary; VMQ, RSS, and SR-IOV; SR-IOV; DVMQ
RSS and vRSSNIC Teaming; Host Virtual Adapters and Types of Networks Needed in a Hyper-V Host; Types of Guest Network Adapters; Monitoring Virtual Traffic; The Bottom Line; Chapter 4 Storage Configurations; Storage Fundamentals and VHDX; Types of Controllers; Common VHDX Maintenance Actions; Performing Dynamic VHDX Resize; Storage Spaces and Windows as a Storage Solution; Server Message Block (SMB) Usage; SMB Technologies; Using SMB for Hyper-V Storage; iSCSI with Hyper-V; Using the Windows iSCSI Target; Using the Windows iSCSI Initiator; Considerations for Using iSCSI
Understanding Virtual Fibre ChannelLeveraging Shared VHDX; Data Deduplication and Hyper-V; Storage Quality of Service; SAN Storage and SCVMM; The Bottom Line; Chapter 5 Managing Hyper-V; Installing Hyper-V; Using Configuration Levels; Enabling the Hyper-V Role; Actions after Installation of Hyper-V; Deploying Hyper-V Servers with SCVMM; Hyper-V Management Tools; Using Hyper-V Manager; Core Actions Using PowerShell; Securing the Hyper-V Server; Creating and Managing a Virtual Machine; Creating and Using Hyper-V Templates; Hyper-V Integration Services and Supported Operating Systems
Migrating Physical Servers and Virtual Machines to Hyper-V Virtual Machines
Record Nr. UNINA-9910453435003321
Savill John  
Indianapolis, Indiana : , : Wiley, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Mastering hyper-V 2012 R2 with system center and windows azure / / John Savill ; acquisitions editor, Mariann Barsolo ; development editor, Kim Beaudet ; technical editor, Sean Deuby ; book designers, Maureen Forys, Judy Fung
Mastering hyper-V 2012 R2 with system center and windows azure / / John Savill ; acquisitions editor, Mariann Barsolo ; development editor, Kim Beaudet ; technical editor, Sean Deuby ; book designers, Maureen Forys, Judy Fung
Autore Savill John
Pubbl/distr/stampa Indianapolis, Indiana : , : Wiley, , 2014
Descrizione fisica 1 online resource (578 p.)
Disciplina 005.4476
Soggetto topico Application software - Design
Cloud computing
Web services
Workflow management systems - Computer programs
ISBN 1-118-82833-X
1-118-82815-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Title Page; Copyright; Contents; Chapter 1 Introduction to Virtualization and Microsoft Solutions; The Evolution of the Datacenter; One Box, One Operating System; How Virtualization Has Changed the Way Companies Work and Its Key Values; History of Hyper-V; Windows Server 2008 Hyper-V Features; Windows Server 2008 R2 Changes; Windows Server 2008 R2 Service Pack 1; Windows Server 2012 Hyper-V Changes; Windows Server 2012 R2; Licensing of Hyper-V; One Operating System (Well, Two, but Really One); Choosing the Version of Hyper-V; The Role of System Center with Hyper-V
System Center Configuration ManagerSystem Center Virtual Machine Manager and App Controller; System Center Operations Manager; System Center Data Protection Manager; System Center Service Manager; System Center Orchestrator; Clouds and Services; The Bottom Line; Chapter 2 Virtual Machine Resource Fundamentals; Understanding VMBus; The Anatomy of a Virtual Machine; Generation 1 Virtual Machine; Generation 2 Virtual Machine; Processor Resources; Virtual Processor to Logical Processor Scheduling; Processor Assignment; NUMA Support; Memory Resources; Virtual Storage; VHD; VHDX
Creating a Virtual Hard DiskPass-Through Storage; The Bottom Line; Chapter 3 Virtual Networking; Virtual Switch Fundamentals; Three Types of Virtual Switch; Creating a Virtual Switch; Extensible Switch; VLANs and PVLANS; Understanding VLANs; VLANs and Hyper-V; PVLANs; How SCVMM Simplifies Networking with Hyper-V; SCVMM Networking Architecture; Deploying Networking with SCVMM 2012 R2; Network Virtualization; Network Virtualization Overview; Implementing Network Virtualization; Useful Network Virtualization Commands; Network Virtualization Gateway; Summary; VMQ, RSS, and SR-IOV; SR-IOV; DVMQ
RSS and vRSSNIC Teaming; Host Virtual Adapters and Types of Networks Needed in a Hyper-V Host; Types of Guest Network Adapters; Monitoring Virtual Traffic; The Bottom Line; Chapter 4 Storage Configurations; Storage Fundamentals and VHDX; Types of Controllers; Common VHDX Maintenance Actions; Performing Dynamic VHDX Resize; Storage Spaces and Windows as a Storage Solution; Server Message Block (SMB) Usage; SMB Technologies; Using SMB for Hyper-V Storage; iSCSI with Hyper-V; Using the Windows iSCSI Target; Using the Windows iSCSI Initiator; Considerations for Using iSCSI
Understanding Virtual Fibre ChannelLeveraging Shared VHDX; Data Deduplication and Hyper-V; Storage Quality of Service; SAN Storage and SCVMM; The Bottom Line; Chapter 5 Managing Hyper-V; Installing Hyper-V; Using Configuration Levels; Enabling the Hyper-V Role; Actions after Installation of Hyper-V; Deploying Hyper-V Servers with SCVMM; Hyper-V Management Tools; Using Hyper-V Manager; Core Actions Using PowerShell; Securing the Hyper-V Server; Creating and Managing a Virtual Machine; Creating and Using Hyper-V Templates; Hyper-V Integration Services and Supported Operating Systems
Migrating Physical Servers and Virtual Machines to Hyper-V Virtual Machines
Record Nr. UNINA-9910790931003321
Savill John  
Indianapolis, Indiana : , : Wiley, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Mastering hyper-V 2012 R2 with system center and windows azure / / John Savill ; acquisitions editor, Mariann Barsolo ; development editor, Kim Beaudet ; technical editor, Sean Deuby ; book designers, Maureen Forys, Judy Fung
Mastering hyper-V 2012 R2 with system center and windows azure / / John Savill ; acquisitions editor, Mariann Barsolo ; development editor, Kim Beaudet ; technical editor, Sean Deuby ; book designers, Maureen Forys, Judy Fung
Autore Savill John
Pubbl/distr/stampa Indianapolis, Indiana : , : Wiley, , 2014
Descrizione fisica 1 online resource (578 p.)
Disciplina 005.4476
Soggetto topico Application software - Design
Cloud computing
Web services
Workflow management systems - Computer programs
ISBN 1-118-82833-X
1-118-82815-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Title Page; Copyright; Contents; Chapter 1 Introduction to Virtualization and Microsoft Solutions; The Evolution of the Datacenter; One Box, One Operating System; How Virtualization Has Changed the Way Companies Work and Its Key Values; History of Hyper-V; Windows Server 2008 Hyper-V Features; Windows Server 2008 R2 Changes; Windows Server 2008 R2 Service Pack 1; Windows Server 2012 Hyper-V Changes; Windows Server 2012 R2; Licensing of Hyper-V; One Operating System (Well, Two, but Really One); Choosing the Version of Hyper-V; The Role of System Center with Hyper-V
System Center Configuration ManagerSystem Center Virtual Machine Manager and App Controller; System Center Operations Manager; System Center Data Protection Manager; System Center Service Manager; System Center Orchestrator; Clouds and Services; The Bottom Line; Chapter 2 Virtual Machine Resource Fundamentals; Understanding VMBus; The Anatomy of a Virtual Machine; Generation 1 Virtual Machine; Generation 2 Virtual Machine; Processor Resources; Virtual Processor to Logical Processor Scheduling; Processor Assignment; NUMA Support; Memory Resources; Virtual Storage; VHD; VHDX
Creating a Virtual Hard DiskPass-Through Storage; The Bottom Line; Chapter 3 Virtual Networking; Virtual Switch Fundamentals; Three Types of Virtual Switch; Creating a Virtual Switch; Extensible Switch; VLANs and PVLANS; Understanding VLANs; VLANs and Hyper-V; PVLANs; How SCVMM Simplifies Networking with Hyper-V; SCVMM Networking Architecture; Deploying Networking with SCVMM 2012 R2; Network Virtualization; Network Virtualization Overview; Implementing Network Virtualization; Useful Network Virtualization Commands; Network Virtualization Gateway; Summary; VMQ, RSS, and SR-IOV; SR-IOV; DVMQ
RSS and vRSSNIC Teaming; Host Virtual Adapters and Types of Networks Needed in a Hyper-V Host; Types of Guest Network Adapters; Monitoring Virtual Traffic; The Bottom Line; Chapter 4 Storage Configurations; Storage Fundamentals and VHDX; Types of Controllers; Common VHDX Maintenance Actions; Performing Dynamic VHDX Resize; Storage Spaces and Windows as a Storage Solution; Server Message Block (SMB) Usage; SMB Technologies; Using SMB for Hyper-V Storage; iSCSI with Hyper-V; Using the Windows iSCSI Target; Using the Windows iSCSI Initiator; Considerations for Using iSCSI
Understanding Virtual Fibre ChannelLeveraging Shared VHDX; Data Deduplication and Hyper-V; Storage Quality of Service; SAN Storage and SCVMM; The Bottom Line; Chapter 5 Managing Hyper-V; Installing Hyper-V; Using Configuration Levels; Enabling the Hyper-V Role; Actions after Installation of Hyper-V; Deploying Hyper-V Servers with SCVMM; Hyper-V Management Tools; Using Hyper-V Manager; Core Actions Using PowerShell; Securing the Hyper-V Server; Creating and Managing a Virtual Machine; Creating and Using Hyper-V Templates; Hyper-V Integration Services and Supported Operating Systems
Migrating Physical Servers and Virtual Machines to Hyper-V Virtual Machines
Record Nr. UNINA-9910818693703321
Savill John  
Indianapolis, Indiana : , : Wiley, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
UX: : Tales From the Trenches / / Hay, Luke
UX: : Tales From the Trenches / / Hay, Luke
Autore Hay Luke
Edizione [1st edition]
Pubbl/distr/stampa SitePoint, , 2019
Descrizione fisica 1 online resource (56 pages)
Soggetto topico Human-computer interaction
User interfaces (Computer systems)
User-centered system design
Web sites - Design
Application software - Design
ISBN 9781098122690
1098122690
9781098122713
1098122712
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto How analytics helped solve a UX issue / Luke Hay -- Using prototyping tools to define better weather icons for everyone / Dan Goodwin -- How user research turned a good app into a great one / Jodie Moule -- Accessibility and inclusive design : why they're not the same / Derek Featherstone -- Exposing the real cause of most UX issues / Joe Natoli.
Altri titoli varianti User experience : tales from the trenches
Record Nr. UNINA-9911046598903321
Hay Luke  
SitePoint, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui