Advanced Oracle PL/SQL developer's guide : master the advanced concepts of PL/SQL for professional-level certification and learn the new capabilities of Oracle Database 12c / / Saurabh K. Gupta |
Autore | Gupta Saurabh K. |
Edizione | [Second edition.] |
Pubbl/distr/stampa | Birmingham : , : Packt Publishing, , 2016 |
Descrizione fisica | 1 online resource (428 p.) |
Disciplina | 005.7565 |
Collana | Professional expertise distilled |
Soggetto topico |
PL/SQL (Computer program language)
Database design |
ISBN | 1-78528-252-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Overview of PL/SQL Programming Concepts; Chapter 2: Oracle 12c SQL and PL/SQL New Features; Chapter 3: Designing PL/SQL Code; Chapter 4: Using Collections; Chapter 5: Using Advanced Interface Methods; Chapter 6: Virtual Private Database; Chapter 7: Oracle SecureFiles; Chapter 8: Tuning PL/SQL Code; Chapter 9: Result Cache; Chapter 10: Analyzing, Profiling, and Tracing PL/SQL Code; Chapter 11: Safeguarding PL/SQL Code against SQL injection
Chapter 12: Working with Oracle SQL DeveloperIndex; Introduction to PL/SQL; Cursors - an overview; Exception handling in PL/SQL; Creating stored procedures; Functions; A PL/SQL package; Oracle Database 12c enhancements to PL/SQL subprograms; Managing database dependencies; Reviewing Oracle-supplied packages; Oracle SQL Developer; Summary; Practice exercise; Database consolidation and the new Multitenant architecture; Oracle 12c SQL and PL/SQL new features; The Oracle Database 12c (12.1.0.2) In-Memory option; Summary; Cursor structures; Cursor variables Implicit statement results in Oracle Database 12cSubtypes; Summary; Practice exercise; Introduction to collections; Collection types; Associative arrays; Nested tables; Varray; Comparing the collection types; Oracle 12c enhancements to collections; PL/SQL collection methods; Summary; Practice exercise; Overview of External Procedures; Components of external procedure execution flow; Executing external C programs from PL/SQL; Securing External Procedures with Oracle Database 12c; Executing Java programs from PL/SQL; Summary; Practice exercise; Oracle Database Security overview Fine-Grained Access ControlVirtual Private Database; Virtual Private Database metadata; Oracle Database 12c Security enhancements; Summary; Practice exercise; Introduction to Large Objects; LOB data types in Oracle; Oracle SecureFiles; Working with LOBs; Migrating LONG to LOBs; Migrating BasicFiles to SecureFiles; Oracle Database 12c enhancements to SecureFiles; Summary; Practice exercise; The PL/SQL Compiler; Native and interpreted compilation techniques; Tuning PL/SQL code; Summary; Practice exercise; Oracle Database 11g Result Cache; SQL query Result Cache; PL/SQL Function Result Cache OCI Client results cacheThe DBMS_RESULT_CACHE package; Result cache in Real Application Clusters; Summary; Practice exercise; A sample PL/SQL program; Tracking PL/SQL coding information; Determining identifier types and usages; The DBMS_METADATA package; Tracing PL/SQL programs using DBMS_TRACE; Profiling PL/SQL code; Summary; Practice exercise; What is SQL injection?; Preventing SQL injection attacks; Testing the code for SQL injection flaws; Summary; Practice exercise; An overview of SQL Developer; Getting started with SQL Developer; SQL Developer 4.0 and 4.1 New Features; Summary PL/SQL program fundamentals |
Record Nr. | UNINA-9910798172003321 |
Gupta Saurabh K. | ||
Birmingham : , : Packt Publishing, , 2016 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Advanced Oracle PL/SQL developer's guide : master the advanced concepts of PL/SQL for professional-level certification and learn the new capabilities of Oracle Database 12c / / Saurabh K. Gupta |
Autore | Gupta Saurabh K. |
Edizione | [Second edition.] |
Pubbl/distr/stampa | Birmingham : , : Packt Publishing, , 2016 |
Descrizione fisica | 1 online resource (428 p.) |
Disciplina | 005.7565 |
Collana | Professional expertise distilled |
Soggetto topico |
PL/SQL (Computer program language)
Database design |
ISBN | 1-78528-252-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Overview of PL/SQL Programming Concepts; Chapter 2: Oracle 12c SQL and PL/SQL New Features; Chapter 3: Designing PL/SQL Code; Chapter 4: Using Collections; Chapter 5: Using Advanced Interface Methods; Chapter 6: Virtual Private Database; Chapter 7: Oracle SecureFiles; Chapter 8: Tuning PL/SQL Code; Chapter 9: Result Cache; Chapter 10: Analyzing, Profiling, and Tracing PL/SQL Code; Chapter 11: Safeguarding PL/SQL Code against SQL injection
Chapter 12: Working with Oracle SQL DeveloperIndex; Introduction to PL/SQL; Cursors - an overview; Exception handling in PL/SQL; Creating stored procedures; Functions; A PL/SQL package; Oracle Database 12c enhancements to PL/SQL subprograms; Managing database dependencies; Reviewing Oracle-supplied packages; Oracle SQL Developer; Summary; Practice exercise; Database consolidation and the new Multitenant architecture; Oracle 12c SQL and PL/SQL new features; The Oracle Database 12c (12.1.0.2) In-Memory option; Summary; Cursor structures; Cursor variables Implicit statement results in Oracle Database 12cSubtypes; Summary; Practice exercise; Introduction to collections; Collection types; Associative arrays; Nested tables; Varray; Comparing the collection types; Oracle 12c enhancements to collections; PL/SQL collection methods; Summary; Practice exercise; Overview of External Procedures; Components of external procedure execution flow; Executing external C programs from PL/SQL; Securing External Procedures with Oracle Database 12c; Executing Java programs from PL/SQL; Summary; Practice exercise; Oracle Database Security overview Fine-Grained Access ControlVirtual Private Database; Virtual Private Database metadata; Oracle Database 12c Security enhancements; Summary; Practice exercise; Introduction to Large Objects; LOB data types in Oracle; Oracle SecureFiles; Working with LOBs; Migrating LONG to LOBs; Migrating BasicFiles to SecureFiles; Oracle Database 12c enhancements to SecureFiles; Summary; Practice exercise; The PL/SQL Compiler; Native and interpreted compilation techniques; Tuning PL/SQL code; Summary; Practice exercise; Oracle Database 11g Result Cache; SQL query Result Cache; PL/SQL Function Result Cache OCI Client results cacheThe DBMS_RESULT_CACHE package; Result cache in Real Application Clusters; Summary; Practice exercise; A sample PL/SQL program; Tracking PL/SQL coding information; Determining identifier types and usages; The DBMS_METADATA package; Tracing PL/SQL programs using DBMS_TRACE; Profiling PL/SQL code; Summary; Practice exercise; What is SQL injection?; Preventing SQL injection attacks; Testing the code for SQL injection flaws; Summary; Practice exercise; An overview of SQL Developer; Getting started with SQL Developer; SQL Developer 4.0 and 4.1 New Features; Summary PL/SQL program fundamentals |
Record Nr. | UNINA-9910815849803321 |
Gupta Saurabh K. | ||
Birmingham : , : Packt Publishing, , 2016 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Advanced penetration testing for highly-secured environments |
Autore | Allen Lee (Information security specialist) |
Edizione | [Second edition /] |
Pubbl/distr/stampa | Birmingham : , : Packt Publishing, , [2016] |
Descrizione fisica | 1 online resource (428 p.) |
Collana | Community experience distilled |
Soggetto topico |
Penetration testing (Computer security)
Computer networks - Security measures Computer security - Management Computer networks |
Soggetto genere / forma | Electronic books. |
ISBN | 1-78439-202-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover; Copyright; Credits; About the Authors; About the Reviewer; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Penetration Testing Essentials; Chapter 2: Preparing a Test Environment; Chapter 3: Assessment Planning; Chapter 4: Intelligence Gathering; Chapter 5: Network Service Attacks; Chapter 6: Exploitation; Chapter 7: Web Application Attacks; Chapter 8: Exploitation Concepts; Chapter 9: Post-Exploitation; Chapter 10: Stealth Techniques; Chapter 11: Data Gathering and Reporting; Chapter 12: Penetration Testing Challenge; Index; Methodology defined; Example methodologies
Abstract methodologySummary; Introducing VMware Workstation; Installing VMware Workstation; Network design; Understanding the default architecture; Creating the switches; Putting it all together; Summary; Introducing advanced penetration testing; Before testing begins; Planning for action; Installing LibreOffice; Effectively managing your test results; Introduction to the Dradis framework; Summary; Introducing reconnaissance; DNS recon; Gathering and validating domain and IP information; Using search engines to do your job for you; Creating network baselines with scanPBNJ; Summary Web Application Attack and Audit framework (w3af)Introduction to browser plugin HackBar; Reader challenge; Summary; Buffer overflows - a refresher; 64-bit exploitation; Introducing vulnserver; Fuzzing tools included in Kali; Social Engineering Toolkit; Fast-Track; Reader challenge; Summary; Rules of Engagement; Data gathering, network analysis, and pillaging; Pivoting; Reader challenge; Summary; Lab preparation; Stealth scanning through the firewall; Now you see me, now you don't - avoiding IDS; Blending in; PfSense SSH logs; Looking at traffic patterns; Cleaning up compromised hosts Miscellaneous evasion techniquesReader challenge; Summary; Record now - sort later; Old school - the text editor method; Dradis framework for collaboration; The report; Reader challenge; Summary; Firewall lab setup; The scenario; The virtual lab setup; The challenge; The walkthrough; Reporting; Summary; Penetration testing framework; Penetration Testing Execution Standard; Pre-engagement interactions; Intelligence gathering; Threat modeling; Vulnerability analysis; Exploitation; Post exploitation; Reporting; Final thoughts; Why VMware Workstation?; VMnet0; VMnet1; VMnet8; Folders Installing Kali Linux |
Record Nr. | UNINA-9910466127703321 |
Allen Lee (Information security specialist) | ||
Birmingham : , : Packt Publishing, , [2016] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Advanced penetration testing for highly-secured environments |
Autore | Allen Lee (Information security specialist) |
Edizione | [Second edition /] |
Pubbl/distr/stampa | Birmingham : , : Packt Publishing, , [2016] |
Descrizione fisica | 1 online resource (428 p.) |
Collana | Community experience distilled |
Soggetto topico |
Penetration testing (Computer security)
Computer networks - Security measures Computer security - Management Computer networks |
ISBN | 1-78439-202-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover; Copyright; Credits; About the Authors; About the Reviewer; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Penetration Testing Essentials; Chapter 2: Preparing a Test Environment; Chapter 3: Assessment Planning; Chapter 4: Intelligence Gathering; Chapter 5: Network Service Attacks; Chapter 6: Exploitation; Chapter 7: Web Application Attacks; Chapter 8: Exploitation Concepts; Chapter 9: Post-Exploitation; Chapter 10: Stealth Techniques; Chapter 11: Data Gathering and Reporting; Chapter 12: Penetration Testing Challenge; Index; Methodology defined; Example methodologies
Abstract methodologySummary; Introducing VMware Workstation; Installing VMware Workstation; Network design; Understanding the default architecture; Creating the switches; Putting it all together; Summary; Introducing advanced penetration testing; Before testing begins; Planning for action; Installing LibreOffice; Effectively managing your test results; Introduction to the Dradis framework; Summary; Introducing reconnaissance; DNS recon; Gathering and validating domain and IP information; Using search engines to do your job for you; Creating network baselines with scanPBNJ; Summary Web Application Attack and Audit framework (w3af)Introduction to browser plugin HackBar; Reader challenge; Summary; Buffer overflows - a refresher; 64-bit exploitation; Introducing vulnserver; Fuzzing tools included in Kali; Social Engineering Toolkit; Fast-Track; Reader challenge; Summary; Rules of Engagement; Data gathering, network analysis, and pillaging; Pivoting; Reader challenge; Summary; Lab preparation; Stealth scanning through the firewall; Now you see me, now you don't - avoiding IDS; Blending in; PfSense SSH logs; Looking at traffic patterns; Cleaning up compromised hosts Miscellaneous evasion techniquesReader challenge; Summary; Record now - sort later; Old school - the text editor method; Dradis framework for collaboration; The report; Reader challenge; Summary; Firewall lab setup; The scenario; The virtual lab setup; The challenge; The walkthrough; Reporting; Summary; Penetration testing framework; Penetration Testing Execution Standard; Pre-engagement interactions; Intelligence gathering; Threat modeling; Vulnerability analysis; Exploitation; Post exploitation; Reporting; Final thoughts; Why VMware Workstation?; VMnet0; VMnet1; VMnet8; Folders Installing Kali Linux |
Record Nr. | UNINA-9910798229903321 |
Allen Lee (Information security specialist) | ||
Birmingham : , : Packt Publishing, , [2016] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Advanced penetration testing for highly-secured environments |
Autore | Allen Lee (Information security specialist) |
Edizione | [Second edition /] |
Pubbl/distr/stampa | Birmingham : , : Packt Publishing, , [2016] |
Descrizione fisica | 1 online resource (428 p.) |
Collana | Community experience distilled |
Soggetto topico |
Penetration testing (Computer security)
Computer networks - Security measures Computer security - Management Computer networks |
ISBN | 1-78439-202-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover; Copyright; Credits; About the Authors; About the Reviewer; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Penetration Testing Essentials; Chapter 2: Preparing a Test Environment; Chapter 3: Assessment Planning; Chapter 4: Intelligence Gathering; Chapter 5: Network Service Attacks; Chapter 6: Exploitation; Chapter 7: Web Application Attacks; Chapter 8: Exploitation Concepts; Chapter 9: Post-Exploitation; Chapter 10: Stealth Techniques; Chapter 11: Data Gathering and Reporting; Chapter 12: Penetration Testing Challenge; Index; Methodology defined; Example methodologies
Abstract methodologySummary; Introducing VMware Workstation; Installing VMware Workstation; Network design; Understanding the default architecture; Creating the switches; Putting it all together; Summary; Introducing advanced penetration testing; Before testing begins; Planning for action; Installing LibreOffice; Effectively managing your test results; Introduction to the Dradis framework; Summary; Introducing reconnaissance; DNS recon; Gathering and validating domain and IP information; Using search engines to do your job for you; Creating network baselines with scanPBNJ; Summary Web Application Attack and Audit framework (w3af)Introduction to browser plugin HackBar; Reader challenge; Summary; Buffer overflows - a refresher; 64-bit exploitation; Introducing vulnserver; Fuzzing tools included in Kali; Social Engineering Toolkit; Fast-Track; Reader challenge; Summary; Rules of Engagement; Data gathering, network analysis, and pillaging; Pivoting; Reader challenge; Summary; Lab preparation; Stealth scanning through the firewall; Now you see me, now you don't - avoiding IDS; Blending in; PfSense SSH logs; Looking at traffic patterns; Cleaning up compromised hosts Miscellaneous evasion techniquesReader challenge; Summary; Record now - sort later; Old school - the text editor method; Dradis framework for collaboration; The report; Reader challenge; Summary; Firewall lab setup; The scenario; The virtual lab setup; The challenge; The walkthrough; Reporting; Summary; Penetration testing framework; Penetration Testing Execution Standard; Pre-engagement interactions; Intelligence gathering; Threat modeling; Vulnerability analysis; Exploitation; Post exploitation; Reporting; Final thoughts; Why VMware Workstation?; VMnet0; VMnet1; VMnet8; Folders Installing Kali Linux |
Record Nr. | UNINA-9910813995003321 |
Allen Lee (Information security specialist) | ||
Birmingham : , : Packt Publishing, , [2016] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Advanced quantitative finance with C++ : create and implement mathemtical models in C++ using quatitaive finance / / Alonso Peña ; cover image by Ravi Kumar |
Autore | Peña Alonso |
Edizione | [1st edition] |
Pubbl/distr/stampa | Birmingham, [England] : , : Packt Publishing, , 2014 |
Descrizione fisica | 1 online resource (124 p.) |
Disciplina | 332.015195 |
Collana | Community Experience Distilled |
Soggetto topico |
Finance - Mathematical models
C++ (Computer program language) |
Soggetto genere / forma | Electronic books. |
ISBN | 1-78216-723-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover; Copyright; Credits; About the Author; Acknowledgments; About the Reviewer; www.PacktPub.com; Table of Contents; Preface; Chapter 1: What is Quantitative Finance?; Discipline 1 - finance (financial derivatives); Discipline 2 - mathematics; Discipline 3 - informatics (C++ programming); The Bento Box template; Summary; Chapter 2: Mathematical Models; Equity; Foreign exchange; Interest rates; Short rate models; Market models; Credit; Structural models; Intensity models; Summary; Chapter 3: Numerical Methods; The Monte Carlo simulation method; Algorithm of MC method; Example of MC method
Binomial Trees methodAlgorithm of the BT method; Example of the BT method; The Finite Difference method; Algorithm of FDM; Example of FD method; Summary; Chapter 4: Equity Derivatives in C++; Basic example - European Call; Advanced example - equity basket; Summary; Chapter 5: Foreign Exchange Derivatives with C++; Basic example - European FX Call (FX1); Advanced example - FX barrier option (FX2); Summary; Chapter 6: Interest Rate Derivatives with C++; Basic example - plain vanilla IRS (IR1); Advanced example - IRS with Cap (IR2); Summary; Chapter 7: Credit Derivatives with C++ Basic example - bankruptcy (CR1)Advanced example - CDS (CR2); Summary; Appendix A: C++ Numerical Libraries for Option Pricing; Numerical recipes; Financial numerical recipes; The QuantLib project; The Boost library; The GSL library; Appendix B: References; Index |
Record Nr. | UNINA-9910464624203321 |
Peña Alonso | ||
Birmingham, [England] : , : Packt Publishing, , 2014 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Advanced Splunk : master the art of getting the maximum out of your machine data using Splunk / / Ashish Kumar Tulsiram Yadav |
Autore | Yadav Ashish Kumar Tulsiram |
Edizione | [1.] |
Pubbl/distr/stampa | Birmingham : , : Packt Publishing, , 2016 |
Descrizione fisica | 1 online resource (348 pages) : color illustrations |
Disciplina | 006.312 |
Collana | Professional expertise distilled |
Soggetto topico |
Big data
Data mining Automatic data collection systems |
Soggetto genere / forma | Electronic books. |
ISBN | 1-78588-121-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910465289903321 |
Yadav Ashish Kumar Tulsiram | ||
Birmingham : , : Packt Publishing, , 2016 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Advanced Splunk : master the art of getting the maximum out of your machine data using Splunk / / Ashish Kumar Tulsiram Yadav |
Autore | Yadav Ashish Kumar Tulsiram |
Edizione | [1.] |
Pubbl/distr/stampa | Birmingham : , : Packt Publishing, , 2016 |
Descrizione fisica | 1 online resource (348 pages) : color illustrations |
Disciplina | 006.312 |
Collana | Professional expertise distilled |
Soggetto topico |
Big data
Data mining Automatic data collection systems |
ISBN | 1-78588-121-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910798456203321 |
Yadav Ashish Kumar Tulsiram | ||
Birmingham : , : Packt Publishing, , 2016 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Advanced Splunk : master the art of getting the maximum out of your machine data using Splunk / / Ashish Kumar Tulsiram Yadav |
Autore | Yadav Ashish Kumar Tulsiram |
Edizione | [1.] |
Pubbl/distr/stampa | Birmingham : , : Packt Publishing, , 2016 |
Descrizione fisica | 1 online resource (348 pages) : color illustrations |
Disciplina | 006.312 |
Collana | Professional expertise distilled |
Soggetto topico |
Big data
Data mining Automatic data collection systems |
ISBN | 1-78588-121-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910814716303321 |
Yadav Ashish Kumar Tulsiram | ||
Birmingham : , : Packt Publishing, , 2016 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Advanced UFT 12 for test engineers Cookbook : over 60 practical recipes to help you accomplish automation tasks using UFT 12 and VBScript / / Meir Bar-Tal, Jonathon Lee Wright ; cover image by Faiz F |
Autore | Bar-Tal Meir |
Edizione | [1st edition] |
Pubbl/distr/stampa | Birmingham, England : , : Packt Publishing, , 2014 |
Descrizione fisica | 1 online resource (272 p.) |
Disciplina | 005.437 |
Collana | Quick answers to common problems |
Soggetto topico | Graphical user interfaces (Computer systems) |
ISBN | 1-84968-841-9 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover; Copyright; Credits; About the Authors; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Data-Driven Tests; Introduction; Creating a DataTable parameter; Retrieving data from a DataTable; Storing data in a DataTable; Importing an Excel file to a test; Exporting a DataTable; Parameterizing Test Object properties; Defining test cases using a DataTable; Storing data in the Environment object; Retrieving data from the Environment object; Reading values from an INI file; Using a configuration file to manage test environments
Using a global dictionary for fast shared data accessUsing a global dictionary for fast shared code access; Chapter 2: Testing Web Pages; Introduction; Checking if page links are broken; Deleting cookies; Managing multiple browser windows; Handling pop-up dialogs; Downloading a file using XMLHttp; Checking whether a website is up; Uploading a file using FTP; Identifying elements based on anchors; Synchronizing a test with a web page loading; Accessing web elements through DOM; Chapter 3: Testing XML and Database; Introduction; Establishing and closing a database connection Using SQL queries programmaticallyUsing a database checkpoint; Using an XML checkpoint; Chapter 4: Method Overriding; Introduction; Overriding a Test Object method; Registering a method to all classes; Using method overriding to support object subtypes; Adding a new method to a class; Chapter 5: Object Identification; Introduction; Setting mandatory and assistive properties for a class; Using Descriptive Programming inline; Using the Description object; Using child objects; Using native properties for object identification; Identifying an object based on its parent Chapter 6: Event and Exception HandlingIntroduction; Catching errors inside a function or subroutine; Creating and using a recovery scenario; Using a global dictionary for recovery; Chapter 7: Using Classes; Introduction; Implementing a class; Implementing a simple search class; Implementing a generic Login class; Implementing function pointers; Implementing a generic Iterator; Chapter 8: Utility and Reserved Objects; Introduction; Using global variables (Environment); Customizing mouse operations (DeviceReplay); Managing processes (SystemUtil); Measuring time (MercuryTimers) Resolving file locations (PathFinder)Loading shared object repositories (RepositoriesCollection); Loading and creating XML documents (XMLUtil); Drawing a rectangle on the screen with Win32 API methods (Extern); Verifying binary file contents (FileCompare); Implementing a custom reserved object; Using remote objects; Utility statements; Chapter 9: Windows Script Host (WSH); Introduction; Reading a key from the Windows® system registry; Writing a key to the Windows® system registry; Deleting a key from the Windows® system registry; Running a process using the Windows® system shell Chapter 10: Frameworks |
Record Nr. | UNINA-9910787906303321 |
Bar-Tal Meir | ||
Birmingham, England : , : Packt Publishing, , 2014 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|