IPhone and iPad apps for absolute beginners / / Rory Lewis and Chad Mello
| IPhone and iPad apps for absolute beginners / / Rory Lewis and Chad Mello |
| Autore | Lewis Rory |
| Edizione | [3rd ed.] |
| Pubbl/distr/stampa | New York, : Apress, c2013 |
| Descrizione fisica | 1 online resource (xxii, 366 pages) : illustrations (some color) |
| Disciplina | 005.26 |
| Altri autori (Persone) | MelloChad |
| Collana | Gale eBooks |
| Soggetto topico |
iPhone (Smartphone) - Programming
iPad (Computer) - Programming Application software - Development iPhone (Smartphone) iPad (Computer) Application software - Design |
| ISBN |
9781430246183
1430246189 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Cover; Title Page; Copyright Page; Table of Contents; Foreword: About the Author; Why You'll Relate to Dr. Lewis; Fast-Forward 17 Years; Past-Present-Future; Why Write This Book?; About the Contributing Authors; Acknowledgments; Preface; What This Book Will Do For You; Sound Familiar?; How Do I Know This About You?; The Approach I Take; Chapter 1: Preliminaries; Necessities and Accessories; Getting a Mac; Getting OS X; Becoming a Developer; Making Your Choice; Installing Xcode; Getting Ready for Your First iPhone/iPad Project; Installing DemoMonkey; Chapter 2: Blast-Off!
Running your App on the iPhone SimulatorRunning Your iPhone App on the iPad Simulator; Running Your iPad App on the iPad Simulator; Digging the Code; Chapter 3: Keep on Truckin'; helloWorld_03: An Interactive Single View App; Creating the User Interface; Connecting to the Code; Digging the Code: -(IBAction)button: (id)sender; ; Setting up the Coding Environment; Creating a Programming Roadmap; Digging the Code; Nibs, Zibs, and Xibs; Methods; Header Files; The Inspector Bar; Chapter 4: Buttons and Labels with Multiple Graphics; Roadmap Recap; helloWorld_04: A View-Based Application Understanding IBOutlets and IBActionsUsing pointers; Properties: Management and Control; Adding IBActions; Digging the Code; IBOutlets and IBActions; More About Pointers; Model-View-Controller; Chapter 5: Touches; Redefining "Giving Up"; Roadmap Recap; Touches: A View-Based Application; CGAffineTransform Structs; Coding the Implementation File; viewDidLoad; Coding the Shrink Button; Coding the Hide Button; Coding the Change Button; Running the Code; Digging the Code; Chapter 6: Switches; Don't Freak Out: Let's Look at Your Brain!; switches: A Tabbed Application; Obtaining the Resources Creating the AppAdding the Images to the Project; Running the App; Customizing the Views; Customizing the Buttons; Creating the Second View; Connecting and Coding the Buttons; Digging the Code; Compile-time and Runtime; Chapter 7: Storyboards; Storytelling; Roadmap Recap; Evolve: A View-Based Storyboard Application; Phase I: Creating Core Storyboarding Configurations; Phase II: Setting Up and Establishing the Content of the View Controllers; Phase III: Working on Closure and Coding; Chapter 8: Introducing MapKit; A Little About Frameworks; MapKit Showcase: Preinstalled Apps Turn-by-Turn NavigationTraffic: A Smarter Way to Cope; Local Search; See More, Do More; Innovative and Popular MapKit Apps Inspire Us; MyMapKit_01: A Universal Single View Application; Preliminaries; A New Single View Template; Preliminaries: Adding the MapKit Framework; Bring in the Images!; Finishing the View Controllers; Making It Go: Running Your First MapKit App; Time to Show Off!; Chapter 9: MapKit with a Little More Effort; Understanding Map Geometry and Coordinate Systems; Important Things to Know; myMapkit_02: A Single View iPad Application; Possible Prepping for the App Preliminaries |
| Record Nr. | UNINA-9910735401203321 |
Lewis Rory
|
||
| New York, : Apress, c2013 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Learn ECMAScript : discover the latest ECMAScript features in order to write cleaner code and learn the fundamentals of JavaScript / / Mehul Mohan, Narayan Prusty
| Learn ECMAScript : discover the latest ECMAScript features in order to write cleaner code and learn the fundamentals of JavaScript / / Mehul Mohan, Narayan Prusty |
| Autore | Mohan Mehul |
| Edizione | [Second edition.] |
| Pubbl/distr/stampa | Birmingham, [England] ; ; Mumbai, [India] : , : Packt, , 2018 |
| Descrizione fisica | 1 online resource (298 pages) |
| Disciplina | 005.2762 |
| Soggetto topico |
JavaScript (Computer program language)
Application software - Design |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9910794625903321 |
Mohan Mehul
|
||
| Birmingham, [England] ; ; Mumbai, [India] : , : Packt, , 2018 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Learn ECMAScript : discover the latest ECMAScript features in order to write cleaner code and learn the fundamentals of JavaScript / / Mehul Mohan, Narayan Prusty
| Learn ECMAScript : discover the latest ECMAScript features in order to write cleaner code and learn the fundamentals of JavaScript / / Mehul Mohan, Narayan Prusty |
| Autore | Mohan Mehul |
| Edizione | [Second edition.] |
| Pubbl/distr/stampa | Birmingham, [England] ; ; Mumbai, [India] : , : Packt, , 2018 |
| Descrizione fisica | 1 online resource (298 pages) |
| Disciplina | 005.2762 |
| Soggetto topico |
JavaScript (Computer program language)
Application software - Design |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9910812172403321 |
Mohan Mehul
|
||
| Birmingham, [England] ; ; Mumbai, [India] : , : Packt, , 2018 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Learning pentesting for Android devices : a practical guide to learning penetration testing for Android devices and applications / / Aditya Gupta ; foreword by Elad Shapira ; cover Image by Michal Jasej
| Learning pentesting for Android devices : a practical guide to learning penetration testing for Android devices and applications / / Aditya Gupta ; foreword by Elad Shapira ; cover Image by Michal Jasej |
| Autore | Gupta Aditya |
| Pubbl/distr/stampa | Birmingham, England : , : Packt Publishing, , 2014 |
| Descrizione fisica | 1 online resource (154 p.) |
| Disciplina | 005.3 |
| Collana | Community Experience Distilled |
| Soggetto topico |
Application software - Design
Application software - Development Computer networks - Security measures |
| Soggetto genere / forma | Electronic books. |
| ISBN | 1-78328-899-X |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Cover; Copyright; Credits; Foreword; About the Author; Acknowledgments; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Getting Started with Android Security; Introduction to Android; Digging deeper into Android; Sandboxing and the permission model; Application signing; Android startup process; Summary; Chapter 2: Preparing the Battlefield; Setting up the development environment; Creating an Android virtual device; Useful utilities for Android Pentest; Android Debug Bridge; Burp Suite; APKTool; Summary; Chapter 3: Reversing and Auditing Android Apps
Android application teardownReversing an Android application; Using Apktool to reverse an Android application; Auditing Android applications; Content provider leakage; Insecure file storage; Path traversal vulnerability/local file inclusion; Client-side injection attacks; OWASP top 10 for mobile; Summary; Chapter 4: Traffic Analysis for Android Devices; Android traffic interception; Ways of Android traffic analysis; Passive analysis; Active analysis; HTTPS Proxy interception; Other ways for SSL Traffic interception; Extracting sensitive files from packet capture; Summary Chapter 5: Android ForensicsTypes of forensics; Filesystems; Android filesystem partitions; Using dd to extract data; Using a custom recovery image; Using Andriller to extract an application's data; Using AFLogical to extract contacts, calls, and text messages; Dumping application databases manually; Logging the logcat; Using backup to extract an application's data; Summary; Chapter 6: Playing with SQLite; Understanding SQLite in depth; Analyzing a simple application using SQLite; Security vulnerability; Summary; Chapter 7: Lesser-known Android Attacks; Android WebView vulnerability Using WebView in the applicationIdentifying the vulnerability; Infecting legitimate APKs; Vulnerabilities in ad libraries; Cross Application Scripting in Android (XAS); Summary; Chapter 8: ARM Exploitation; Introduction to ARM architecture; Execution modes; Setting up the environment; Simple stack-based buffer overflow; Return-oriented programming; Android root exploits; Summary; Chapter 9: Writing the Pentest Report; Basics of a penetration testing report; Writing the pentest report; Executive summary; Vulnerabilities; Scope of the work; Tools used; Testing methodologies followed RecommendationsConclusion; Appendix; Summary; Index |
| Record Nr. | UNINA-9910453751403321 |
Gupta Aditya
|
||
| Birmingham, England : , : Packt Publishing, , 2014 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Learning pentesting for Android devices : a practical guide to learning penetration testing for Android devices and applications / / Aditya Gupta ; foreword by Elad Shapira ; cover Image by Michal Jasej
| Learning pentesting for Android devices : a practical guide to learning penetration testing for Android devices and applications / / Aditya Gupta ; foreword by Elad Shapira ; cover Image by Michal Jasej |
| Autore | Gupta Aditya |
| Pubbl/distr/stampa | Birmingham, England : , : Packt Publishing, , 2014 |
| Descrizione fisica | 1 online resource (154 p.) |
| Disciplina | 005.3 |
| Collana | Community Experience Distilled |
| Soggetto topico |
Application software - Design
Application software - Development Computer networks - Security measures |
| ISBN | 1-78328-899-X |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Cover; Copyright; Credits; Foreword; About the Author; Acknowledgments; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Getting Started with Android Security; Introduction to Android; Digging deeper into Android; Sandboxing and the permission model; Application signing; Android startup process; Summary; Chapter 2: Preparing the Battlefield; Setting up the development environment; Creating an Android virtual device; Useful utilities for Android Pentest; Android Debug Bridge; Burp Suite; APKTool; Summary; Chapter 3: Reversing and Auditing Android Apps
Android application teardownReversing an Android application; Using Apktool to reverse an Android application; Auditing Android applications; Content provider leakage; Insecure file storage; Path traversal vulnerability/local file inclusion; Client-side injection attacks; OWASP top 10 for mobile; Summary; Chapter 4: Traffic Analysis for Android Devices; Android traffic interception; Ways of Android traffic analysis; Passive analysis; Active analysis; HTTPS Proxy interception; Other ways for SSL Traffic interception; Extracting sensitive files from packet capture; Summary Chapter 5: Android ForensicsTypes of forensics; Filesystems; Android filesystem partitions; Using dd to extract data; Using a custom recovery image; Using Andriller to extract an application's data; Using AFLogical to extract contacts, calls, and text messages; Dumping application databases manually; Logging the logcat; Using backup to extract an application's data; Summary; Chapter 6: Playing with SQLite; Understanding SQLite in depth; Analyzing a simple application using SQLite; Security vulnerability; Summary; Chapter 7: Lesser-known Android Attacks; Android WebView vulnerability Using WebView in the applicationIdentifying the vulnerability; Infecting legitimate APKs; Vulnerabilities in ad libraries; Cross Application Scripting in Android (XAS); Summary; Chapter 8: ARM Exploitation; Introduction to ARM architecture; Execution modes; Setting up the environment; Simple stack-based buffer overflow; Return-oriented programming; Android root exploits; Summary; Chapter 9: Writing the Pentest Report; Basics of a penetration testing report; Writing the pentest report; Executive summary; Vulnerabilities; Scope of the work; Tools used; Testing methodologies followed RecommendationsConclusion; Appendix; Summary; Index |
| Record Nr. | UNINA-9910791060703321 |
Gupta Aditya
|
||
| Birmingham, England : , : Packt Publishing, , 2014 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Learning pentesting for Android devices : a practical guide to learning penetration testing for Android devices and applications / / Aditya Gupta ; foreword by Elad Shapira ; cover Image by Michal Jasej
| Learning pentesting for Android devices : a practical guide to learning penetration testing for Android devices and applications / / Aditya Gupta ; foreword by Elad Shapira ; cover Image by Michal Jasej |
| Autore | Gupta Aditya |
| Pubbl/distr/stampa | Birmingham, England : , : Packt Publishing, , 2014 |
| Descrizione fisica | 1 online resource (154 p.) |
| Disciplina | 005.3 |
| Collana | Community Experience Distilled |
| Soggetto topico |
Application software - Design
Application software - Development Computer networks - Security measures |
| ISBN | 1-78328-899-X |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Cover; Copyright; Credits; Foreword; About the Author; Acknowledgments; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Getting Started with Android Security; Introduction to Android; Digging deeper into Android; Sandboxing and the permission model; Application signing; Android startup process; Summary; Chapter 2: Preparing the Battlefield; Setting up the development environment; Creating an Android virtual device; Useful utilities for Android Pentest; Android Debug Bridge; Burp Suite; APKTool; Summary; Chapter 3: Reversing and Auditing Android Apps
Android application teardownReversing an Android application; Using Apktool to reverse an Android application; Auditing Android applications; Content provider leakage; Insecure file storage; Path traversal vulnerability/local file inclusion; Client-side injection attacks; OWASP top 10 for mobile; Summary; Chapter 4: Traffic Analysis for Android Devices; Android traffic interception; Ways of Android traffic analysis; Passive analysis; Active analysis; HTTPS Proxy interception; Other ways for SSL Traffic interception; Extracting sensitive files from packet capture; Summary Chapter 5: Android ForensicsTypes of forensics; Filesystems; Android filesystem partitions; Using dd to extract data; Using a custom recovery image; Using Andriller to extract an application's data; Using AFLogical to extract contacts, calls, and text messages; Dumping application databases manually; Logging the logcat; Using backup to extract an application's data; Summary; Chapter 6: Playing with SQLite; Understanding SQLite in depth; Analyzing a simple application using SQLite; Security vulnerability; Summary; Chapter 7: Lesser-known Android Attacks; Android WebView vulnerability Using WebView in the applicationIdentifying the vulnerability; Infecting legitimate APKs; Vulnerabilities in ad libraries; Cross Application Scripting in Android (XAS); Summary; Chapter 8: ARM Exploitation; Introduction to ARM architecture; Execution modes; Setting up the environment; Simple stack-based buffer overflow; Return-oriented programming; Android root exploits; Summary; Chapter 9: Writing the Pentest Report; Basics of a penetration testing report; Writing the pentest report; Executive summary; Vulnerabilities; Scope of the work; Tools used; Testing methodologies followed RecommendationsConclusion; Appendix; Summary; Index |
| Record Nr. | UNINA-9910822306003321 |
Gupta Aditya
|
||
| Birmingham, England : , : Packt Publishing, , 2014 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Mastering hyper-V 2012 R2 with system center and windows azure / / John Savill ; acquisitions editor, Mariann Barsolo ; development editor, Kim Beaudet ; technical editor, Sean Deuby ; book designers, Maureen Forys, Judy Fung
| Mastering hyper-V 2012 R2 with system center and windows azure / / John Savill ; acquisitions editor, Mariann Barsolo ; development editor, Kim Beaudet ; technical editor, Sean Deuby ; book designers, Maureen Forys, Judy Fung |
| Autore | Savill John |
| Pubbl/distr/stampa | Indianapolis, Indiana : , : Wiley, , 2014 |
| Descrizione fisica | 1 online resource (578 p.) |
| Disciplina | 005.4476 |
| Soggetto topico |
Application software - Design
Cloud computing Web services Workflow management systems - Computer programs |
| Soggetto genere / forma | Electronic books. |
| ISBN | 1-118-82815-1 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Cover; Title Page; Copyright; Contents; Chapter 1 Introduction to Virtualization and Microsoft Solutions; The Evolution of the Datacenter; One Box, One Operating System; How Virtualization Has Changed the Way Companies Work and Its Key Values; History of Hyper-V; Windows Server 2008 Hyper-V Features; Windows Server 2008 R2 Changes; Windows Server 2008 R2 Service Pack 1; Windows Server 2012 Hyper-V Changes; Windows Server 2012 R2; Licensing of Hyper-V; One Operating System (Well, Two, but Really One); Choosing the Version of Hyper-V; The Role of System Center with Hyper-V
System Center Configuration ManagerSystem Center Virtual Machine Manager and App Controller; System Center Operations Manager; System Center Data Protection Manager; System Center Service Manager; System Center Orchestrator; Clouds and Services; The Bottom Line; Chapter 2 Virtual Machine Resource Fundamentals; Understanding VMBus; The Anatomy of a Virtual Machine; Generation 1 Virtual Machine; Generation 2 Virtual Machine; Processor Resources; Virtual Processor to Logical Processor Scheduling; Processor Assignment; NUMA Support; Memory Resources; Virtual Storage; VHD; VHDX Creating a Virtual Hard DiskPass-Through Storage; The Bottom Line; Chapter 3 Virtual Networking; Virtual Switch Fundamentals; Three Types of Virtual Switch; Creating a Virtual Switch; Extensible Switch; VLANs and PVLANS; Understanding VLANs; VLANs and Hyper-V; PVLANs; How SCVMM Simplifies Networking with Hyper-V; SCVMM Networking Architecture; Deploying Networking with SCVMM 2012 R2; Network Virtualization; Network Virtualization Overview; Implementing Network Virtualization; Useful Network Virtualization Commands; Network Virtualization Gateway; Summary; VMQ, RSS, and SR-IOV; SR-IOV; DVMQ RSS and vRSSNIC Teaming; Host Virtual Adapters and Types of Networks Needed in a Hyper-V Host; Types of Guest Network Adapters; Monitoring Virtual Traffic; The Bottom Line; Chapter 4 Storage Configurations; Storage Fundamentals and VHDX; Types of Controllers; Common VHDX Maintenance Actions; Performing Dynamic VHDX Resize; Storage Spaces and Windows as a Storage Solution; Server Message Block (SMB) Usage; SMB Technologies; Using SMB for Hyper-V Storage; iSCSI with Hyper-V; Using the Windows iSCSI Target; Using the Windows iSCSI Initiator; Considerations for Using iSCSI Understanding Virtual Fibre ChannelLeveraging Shared VHDX; Data Deduplication and Hyper-V; Storage Quality of Service; SAN Storage and SCVMM; The Bottom Line; Chapter 5 Managing Hyper-V; Installing Hyper-V; Using Configuration Levels; Enabling the Hyper-V Role; Actions after Installation of Hyper-V; Deploying Hyper-V Servers with SCVMM; Hyper-V Management Tools; Using Hyper-V Manager; Core Actions Using PowerShell; Securing the Hyper-V Server; Creating and Managing a Virtual Machine; Creating and Using Hyper-V Templates; Hyper-V Integration Services and Supported Operating Systems Migrating Physical Servers and Virtual Machines to Hyper-V Virtual Machines |
| Record Nr. | UNINA-9910453435003321 |
Savill John
|
||
| Indianapolis, Indiana : , : Wiley, , 2014 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Mastering hyper-V 2012 R2 with system center and windows azure / / John Savill ; acquisitions editor, Mariann Barsolo ; development editor, Kim Beaudet ; technical editor, Sean Deuby ; book designers, Maureen Forys, Judy Fung
| Mastering hyper-V 2012 R2 with system center and windows azure / / John Savill ; acquisitions editor, Mariann Barsolo ; development editor, Kim Beaudet ; technical editor, Sean Deuby ; book designers, Maureen Forys, Judy Fung |
| Autore | Savill John |
| Pubbl/distr/stampa | Indianapolis, Indiana : , : Wiley, , 2014 |
| Descrizione fisica | 1 online resource (578 p.) |
| Disciplina | 005.4476 |
| Soggetto topico |
Application software - Design
Cloud computing Web services Workflow management systems - Computer programs |
| ISBN |
1-118-82833-X
1-118-82815-1 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Cover; Title Page; Copyright; Contents; Chapter 1 Introduction to Virtualization and Microsoft Solutions; The Evolution of the Datacenter; One Box, One Operating System; How Virtualization Has Changed the Way Companies Work and Its Key Values; History of Hyper-V; Windows Server 2008 Hyper-V Features; Windows Server 2008 R2 Changes; Windows Server 2008 R2 Service Pack 1; Windows Server 2012 Hyper-V Changes; Windows Server 2012 R2; Licensing of Hyper-V; One Operating System (Well, Two, but Really One); Choosing the Version of Hyper-V; The Role of System Center with Hyper-V
System Center Configuration ManagerSystem Center Virtual Machine Manager and App Controller; System Center Operations Manager; System Center Data Protection Manager; System Center Service Manager; System Center Orchestrator; Clouds and Services; The Bottom Line; Chapter 2 Virtual Machine Resource Fundamentals; Understanding VMBus; The Anatomy of a Virtual Machine; Generation 1 Virtual Machine; Generation 2 Virtual Machine; Processor Resources; Virtual Processor to Logical Processor Scheduling; Processor Assignment; NUMA Support; Memory Resources; Virtual Storage; VHD; VHDX Creating a Virtual Hard DiskPass-Through Storage; The Bottom Line; Chapter 3 Virtual Networking; Virtual Switch Fundamentals; Three Types of Virtual Switch; Creating a Virtual Switch; Extensible Switch; VLANs and PVLANS; Understanding VLANs; VLANs and Hyper-V; PVLANs; How SCVMM Simplifies Networking with Hyper-V; SCVMM Networking Architecture; Deploying Networking with SCVMM 2012 R2; Network Virtualization; Network Virtualization Overview; Implementing Network Virtualization; Useful Network Virtualization Commands; Network Virtualization Gateway; Summary; VMQ, RSS, and SR-IOV; SR-IOV; DVMQ RSS and vRSSNIC Teaming; Host Virtual Adapters and Types of Networks Needed in a Hyper-V Host; Types of Guest Network Adapters; Monitoring Virtual Traffic; The Bottom Line; Chapter 4 Storage Configurations; Storage Fundamentals and VHDX; Types of Controllers; Common VHDX Maintenance Actions; Performing Dynamic VHDX Resize; Storage Spaces and Windows as a Storage Solution; Server Message Block (SMB) Usage; SMB Technologies; Using SMB for Hyper-V Storage; iSCSI with Hyper-V; Using the Windows iSCSI Target; Using the Windows iSCSI Initiator; Considerations for Using iSCSI Understanding Virtual Fibre ChannelLeveraging Shared VHDX; Data Deduplication and Hyper-V; Storage Quality of Service; SAN Storage and SCVMM; The Bottom Line; Chapter 5 Managing Hyper-V; Installing Hyper-V; Using Configuration Levels; Enabling the Hyper-V Role; Actions after Installation of Hyper-V; Deploying Hyper-V Servers with SCVMM; Hyper-V Management Tools; Using Hyper-V Manager; Core Actions Using PowerShell; Securing the Hyper-V Server; Creating and Managing a Virtual Machine; Creating and Using Hyper-V Templates; Hyper-V Integration Services and Supported Operating Systems Migrating Physical Servers and Virtual Machines to Hyper-V Virtual Machines |
| Record Nr. | UNINA-9910790931003321 |
Savill John
|
||
| Indianapolis, Indiana : , : Wiley, , 2014 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Mastering hyper-V 2012 R2 with system center and windows azure / / John Savill ; acquisitions editor, Mariann Barsolo ; development editor, Kim Beaudet ; technical editor, Sean Deuby ; book designers, Maureen Forys, Judy Fung
| Mastering hyper-V 2012 R2 with system center and windows azure / / John Savill ; acquisitions editor, Mariann Barsolo ; development editor, Kim Beaudet ; technical editor, Sean Deuby ; book designers, Maureen Forys, Judy Fung |
| Autore | Savill John |
| Pubbl/distr/stampa | Indianapolis, Indiana : , : Wiley, , 2014 |
| Descrizione fisica | 1 online resource (578 p.) |
| Disciplina | 005.4476 |
| Soggetto topico |
Application software - Design
Cloud computing Web services Workflow management systems - Computer programs |
| ISBN |
1-118-82833-X
1-118-82815-1 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Cover; Title Page; Copyright; Contents; Chapter 1 Introduction to Virtualization and Microsoft Solutions; The Evolution of the Datacenter; One Box, One Operating System; How Virtualization Has Changed the Way Companies Work and Its Key Values; History of Hyper-V; Windows Server 2008 Hyper-V Features; Windows Server 2008 R2 Changes; Windows Server 2008 R2 Service Pack 1; Windows Server 2012 Hyper-V Changes; Windows Server 2012 R2; Licensing of Hyper-V; One Operating System (Well, Two, but Really One); Choosing the Version of Hyper-V; The Role of System Center with Hyper-V
System Center Configuration ManagerSystem Center Virtual Machine Manager and App Controller; System Center Operations Manager; System Center Data Protection Manager; System Center Service Manager; System Center Orchestrator; Clouds and Services; The Bottom Line; Chapter 2 Virtual Machine Resource Fundamentals; Understanding VMBus; The Anatomy of a Virtual Machine; Generation 1 Virtual Machine; Generation 2 Virtual Machine; Processor Resources; Virtual Processor to Logical Processor Scheduling; Processor Assignment; NUMA Support; Memory Resources; Virtual Storage; VHD; VHDX Creating a Virtual Hard DiskPass-Through Storage; The Bottom Line; Chapter 3 Virtual Networking; Virtual Switch Fundamentals; Three Types of Virtual Switch; Creating a Virtual Switch; Extensible Switch; VLANs and PVLANS; Understanding VLANs; VLANs and Hyper-V; PVLANs; How SCVMM Simplifies Networking with Hyper-V; SCVMM Networking Architecture; Deploying Networking with SCVMM 2012 R2; Network Virtualization; Network Virtualization Overview; Implementing Network Virtualization; Useful Network Virtualization Commands; Network Virtualization Gateway; Summary; VMQ, RSS, and SR-IOV; SR-IOV; DVMQ RSS and vRSSNIC Teaming; Host Virtual Adapters and Types of Networks Needed in a Hyper-V Host; Types of Guest Network Adapters; Monitoring Virtual Traffic; The Bottom Line; Chapter 4 Storage Configurations; Storage Fundamentals and VHDX; Types of Controllers; Common VHDX Maintenance Actions; Performing Dynamic VHDX Resize; Storage Spaces and Windows as a Storage Solution; Server Message Block (SMB) Usage; SMB Technologies; Using SMB for Hyper-V Storage; iSCSI with Hyper-V; Using the Windows iSCSI Target; Using the Windows iSCSI Initiator; Considerations for Using iSCSI Understanding Virtual Fibre ChannelLeveraging Shared VHDX; Data Deduplication and Hyper-V; Storage Quality of Service; SAN Storage and SCVMM; The Bottom Line; Chapter 5 Managing Hyper-V; Installing Hyper-V; Using Configuration Levels; Enabling the Hyper-V Role; Actions after Installation of Hyper-V; Deploying Hyper-V Servers with SCVMM; Hyper-V Management Tools; Using Hyper-V Manager; Core Actions Using PowerShell; Securing the Hyper-V Server; Creating and Managing a Virtual Machine; Creating and Using Hyper-V Templates; Hyper-V Integration Services and Supported Operating Systems Migrating Physical Servers and Virtual Machines to Hyper-V Virtual Machines |
| Record Nr. | UNINA-9910818693703321 |
Savill John
|
||
| Indianapolis, Indiana : , : Wiley, , 2014 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
UX: : Tales From the Trenches / / Hay, Luke
| UX: : Tales From the Trenches / / Hay, Luke |
| Autore | Hay Luke |
| Edizione | [1st edition] |
| Pubbl/distr/stampa | SitePoint, , 2019 |
| Descrizione fisica | 1 online resource (56 pages) |
| Soggetto topico |
Human-computer interaction
User interfaces (Computer systems) User-centered system design Web sites - Design Application software - Design |
| ISBN |
9781098122690
1098122690 9781098122713 1098122712 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | How analytics helped solve a UX issue / Luke Hay -- Using prototyping tools to define better weather icons for everyone / Dan Goodwin -- How user research turned a good app into a great one / Jodie Moule -- Accessibility and inclusive design : why they're not the same / Derek Featherstone -- Exposing the real cause of most UX issues / Joe Natoli. |
| Altri titoli varianti | User experience : tales from the trenches |
| Record Nr. | UNINA-9911046598903321 |
Hay Luke
|
||
| SitePoint, , 2019 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||